exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 97 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 97
Topic #: 1
[All 312-50v11 Questions]

What is the way to decide how a packet will move from an untrusted outside host to a protected inside that is behind a firewall, which permits the hacker to determine which ports are open and if the packets can pass through the packet-filtering of the firewall?

  • A. Session hijacking
  • B. Firewalking
  • C. Man-in-the middle attack
  • D. Network sniffing
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
czarul79
Highly Voted 2 years, 2 months ago
B is correct answer. Firewalk is an active reconnaissance network security tool that attempts to determine what layer 4 protocols a given IP forwarding device will pass. Firewalk works by sending out TCP or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the traffic, it will forward the packets to the next hop where they will expire and elicit an ICMP_TIME_EXCEEDED message. If the gateway hostdoes not allow the traffic, it will likely drop the packets on the floor and we will see no response.
upvoted 38 times
Mr_Gray
1 year, 7 months ago
thank you. These are the kind of discussion people need.
upvoted 8 times
Snipa_x
1 year, 5 months ago
I'm just curious. Have you taken the exam yet?
upvoted 1 times
...
...
...
SeaH0rse66
Highly Voted 11 months, 2 weeks ago
Selected Answer: B
CEH V11 Module 12 Page 1551 " Firewalking is a method of collecting information about remote networks behind firewalls. It is a technique that uses TTL values to determine gateway ACL filters and map networks by analyzing the IP packet response. It probes ACLs on packet filtering routers/firewalls using the same method as tracerouting. Firewalking involves sending TCP or UDP packets into the firewall where the TTL value is one hop greater than the targeted firewall. If the packet makes it through the gateway, the system forwards it to the next hop, where the TTL equals one, and prompts an ICMP error message at the point of rejection with a "TTL exceeded in transi" message. This method helps locate a firewall; additional probing facilities fingerprinting and identification of vulnerabilities."
upvoted 7 times
...
Daniel8660
Most Recent 6 months, 3 weeks ago
Selected Answer: B
Firewall Evasion Techniques Firewall Identification Firewalking - a method of collecting information about remote networks behind firewalls. (P.1567/1551)
upvoted 3 times
...
ANDRESCB1988
1 year, 9 months ago
correct
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago