exam questions

Exam 312-50v13 All Questions

View all questions & answers for the 312-50v13 exam

Exam 312-50v13 topic 1 question 203 discussion

Actual exam question from ECCouncil's 312-50v13
Question #: 203
Topic #: 1
[All 312-50v13 Questions]

An ethical hacker is hired to conduct a comprehensive network scan of a large organization that strongly suspects potential intrusions into their internal systems. The hacker decides to employ a combination of scanning tools to obtain a detailed understanding of the network. Which sequence of actions would provide the most comprehensive information about the network's status?

  • A. Use Hping3 for an ICMP ping scan on the entire subnet, then use Nmap for a SYN scan on identified active hosts, and finally use Metasploit to exploit identified vulnerabilities.
  • B. Start with Hping3 for a UDP scan on random ports, then use Nmap for a version detection scan, and finally use Metasploit to exploit detected vulnerabilities.
  • C. Begin with NetScanTools Pro for a general network scan, then use Nmap for OS detection and version detection, and finally perform an SYN flooding with Hping3.
  • D. Initiate with Nmap for a ping sweep, then use Metasploit to scan for open ports and services, and finally use Hping3 to perform remote OS fingerprinting.
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
mulekule
3 weeks ago
Selected Answer: A
A is the correct answer.
upvoted 1 times
...
killwitch
1 month, 3 weeks ago
Selected Answer: A
This sequence of actions provides the most structured and comprehensive approach to network scanning and penetration testing: Hping3 for ICMP Ping Scan: Identifies live hosts on the network by sending ICMP Echo Requests. Can bypass some firewalls and filters compared to standard ping. Helps to narrow down the target list for further scanning. Nmap for SYN Scan: Performs a stealthy port scan on the active hosts identified in the first step. Helps detect open ports and running services without completing a full TCP handshake. Can be combined with service and version detection for deeper analysis. Metasploit for Exploitation: Uses vulnerabilities identified in the scanning phase. Helps determine real-world risks by testing for possible exploitation. Provides insights into security weaknesses that need patching.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago