exam questions

Exam ECSAv10 All Questions

View all questions & answers for the ECSAv10 exam

Exam ECSAv10 topic 1 question 12 discussion

Actual exam question from ECCouncil's ECSAv10
Question #: 12
Topic #: 1
[All ECSAv10 Questions]

Peter, a disgruntled ex-employee of Zapmaky Solutions Ltd., is trying to jeopardize the company's website http://zapmaky.com. He conducted the port scan of the website by using the Nmap tool to extract the information about open ports and their corresponding services. While performing the scan, he recognized that some of his requests are being blocked by the firewall deployed by the IT personnel of Zapmaky and he wants to bypass the same. For evading the firewall, he wanted to employ the stealth scanning technique which is an incomplete TCP three-way handshake method that can effectively bypass the firewall rules and logging mechanisms.
Which if the following Nmap commands should Peter execute to perform stealth scanning?

  • A. nmap -sT -v zapmaky.com
  • B. nmap -T4 -A -v zapmaky.com
  • C. nmap -sX -T4 -A -v zapmaky.com
  • D. nmap -sN -A zapmaky.com
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ccie_cbap
3 years, 7 months ago
d is corret
upvoted 1 times
...
vanemorocho
4 years, 3 months ago
The response is D
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...