exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 4 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 4
Topic #: 1
[All 312-50v13 Questions]

You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?

  • A. nmap -A - Pn
  • B. nmap -sP -p-65535 -T5
  • C. nmap -sT -O -T0
  • D. nmap -A --host-timeout 99 -T1
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
e30b32d
1 month, 1 week ago
Selected Answer: C
| Template | Name | Speed | Stealth | Use Case | | -------- | ---------- | --------- | ------------- | ------------------------------------ | | `-T0` | Paranoid | Very slow | Very stealthy | IDS evasion, ultra stealth | | `-T1` | Sneaky | Slow | Stealthy | Low-traffic networks | | `-T2` | Polite | Moderate | Reduced load | Scanning during work hours | | `-T3` | Normal | Default | Balanced | Default scan setting | | `-T4` | Aggressive | Fast | Noisy | Fast scans on stable networks | | `-T5` | Insane | Very fast | Very noisy | Very fast, but likely to trigger IDS |
upvoted 2 times
...
e30b32d
1 month, 1 week ago
Selected Answer: C
When you're trying to evade Intrusion Detection Systems (IDS), your goal is to reduce noise and avoid triggering alerts. Here's why option C is the best among the given: -sT: This is a TCP connect scan. While it's more detectable than a stealth SYN scan (-sS), it may blend in better with normal traffic in some networks. -O: Enables OS detection which does generate more traffic, but since all options include some level of detail gathering, this is acceptable here. -T0: This sets the timing template to the slowest (Paranoid), making the scan very slow but low and stealthy, thus minimizing noise and helping evade IDS.
upvoted 2 times
...
d503c75
1 month, 2 weeks ago
Selected Answer: C
Nmap have 6 templates, and the -T0 -> paranoid and -T1 -> sneaky, are used to IDS evasion (set nmap to scan very slowly).
upvoted 1 times
...
NikoTomas
3 months, 3 weeks ago
Selected Answer: C
Correct: C T0 = timing template serializing the scan so only one port is scanned at a time, and waiting 5 minutes between sending each probe. T1 and T2 are similar but they only wait 15 seconds and 0.4 seconds, respectively, between probes. T3 is Nmap's default behavior, which includes parallelization. D is NOT correct: --host-timeout <time> (Give up on slow target hosts after the timeout) = amount of time you are willing to wait. For example, specify 30m to ensure that Nmap doesn't waste more than half an hour on a single host. Note that Nmap may be scanning other hosts at the same time during that half an hour, so it isn't a complete loss. A host that times out is skipped. No port table, OS detection, or version detection results are printed for that host. Source: https://nmap.org/book/man-performance.html
upvoted 4 times
...
AY_Tseng
4 months ago
Selected Answer: D
selete D
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...