exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 147 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 147
Topic #: 1
[All 312-50v11 Questions]

To create a botnet, the attacker can use several techniques to scan vulnerable machines. The attacker first collects information about a large number of vulnerable machines to create a list. Subsequently, they infect the machines. The list is divided by assigning half of the list to the newly compromised machines.
The scanning process runs simultaneously. This technique ensures the spreading and installation of malicious code in little time.
Which technique is discussed here?

  • A. Subnet scanning technique
  • B. Permutation scanning technique
  • C. Hit-list scanning technique.
  • D. Topological scanning technique
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Daniel8660
Highly Voted 1 year, 7 months ago
Selected Answer: C
Botnets - Scanning Methods for Finding Vulnerable Machines Hit-list Scanning - The attacker scans the list to find a vulnerable machine. On finding one, the attacker installs malicious code on it and divides the list in half. The attacker continues to scan one half, whereas the other half is scanned by the newly compromised machine. This process keeps repeating, causing the number of compromised machines to increase exponentially. (P.1337/1321)
upvoted 8 times
...
dinonino
Highly Voted 1 year, 7 months ago
Random Scanning - The infected machine probes IP addresses randomly from the target network IP range and checks for vulnerabilities Hit-list Scanning - An attacker first collects a list of potentially vulnerable machines and then scans them to find vulnerable machines Topological Scanning - It uses information obtained from an infected machine to find new vulnerable machines Local Subnet Scanning - The infected machine looks for new vulnerable machines in its own local network Permutation Scanning - It uses a pseudorandom permutation list of IP addresses to find new vulnerable machines
upvoted 6 times
...
ostorgaf
Most Recent 8 months, 2 weeks ago
Selected Answer: C
Through scanning, an attacker first collects a list of potentially vulnerable machines and then creates a zombie army. Subsequently, the attacker scans the list to find a vulnerable machine. On finding one, the attacker installs malicious code on it and divides the list in half. The attacker continues to scan one half, whereas the other half is scanned by the newly compromised machine. This process keeps repeating, causing the number of compromised machines to increase exponentially. This technique ensures the installation of malicious code on all the potentially vulnerable machines in the hit list within a short time. Certified Ethical Hacker (CEH) Version 12 eBook page 954
upvoted 1 times
...
muktibiswas
10 months, 2 weeks ago
Ans is D because topological scanning is alternative of hit list but scans newly vulneral machine , here newly word is used
upvoted 2 times
...
juliosc
1 year, 2 months ago
Hit List Scanning: An attacker first collects a list of potentially vulnerable machines and then scans them to find vulnerable machines
upvoted 1 times
...
asadeyemo
1 year, 4 months ago
The correct answer is c: Hit-list scanning technique.
upvoted 2 times
...
kiki533
1 year, 6 months ago
C Hit-List Scan
upvoted 2 times
...
JackyLai88
1 year, 7 months ago
Selected Answer: C
Hit-list Scanning Through scanning, an attacker first collects a list of potentially vulnerable machines and then creates a zombie army. Subsequently, the attacker scans the list to find a vulnerable machine. On finding one, the attacker installs malicious code on it and divides the list in half. The attacker continues to scan one half, whereas the other half is scanned by the newly compromised machine. This process keeps repeating, causing the number of compromised machines to increase exponentially. This technique ensures the installation of malicious code on all the potentially vulnerable machines in the hit list within a short time.
upvoted 3 times
...
antoclk
1 year, 7 months ago
Selected Answer: C
Before the worm is free, the worm author collects a listing of say ten,000 to 50,000 potentially vulnerable machines, ideally ones with sensible network connections. The worm begins scanning down the list. once it infects a machine, it divides the hit-list in half, communicating half to the recipient worm, keeping the other half. This fast division ensures that even if only 10-20% of the machines on the hit-list are actually vulnerable, an active worm can quickly bear the hit-list and establish itself on all vulnerable machines in only some seconds. though the hit-list could begin at 200 kilobytes, it quickly shrinks to nothing during the partitioning. This provides a great benefit in constructing a quick worm by speeding the initial infection.
upvoted 1 times
...
sn30
1 year, 7 months ago
Selected Answer: C
Correct answer is C
upvoted 1 times
...
tinkerer
1 year, 7 months ago
Selected Answer: D
D is correct
upvoted 1 times
AaronS1990
1 year, 5 months ago
I definitely isn't
upvoted 1 times
...
...
TroyMcLure
1 year, 8 months ago
Selected Answer: C
An attacker first collects a list of potentially vulnerable machines and then scans them to find vulnerable machines
upvoted 1 times
...
Aisha86
1 year, 8 months ago
answer c. Through scanning, an attacker first collects a list of potentially vulnerable machines and then creates a zombie army. Subsequently, the attacker scans the list to find a vulnerable machine. On finding one, the attacker installs malicious code on it and divides the list in half.
upvoted 1 times
...
mike12111
1 year, 8 months ago
Selected Answer: C
correct answer
upvoted 1 times
...
Kamal_SriLanka
2 years, 9 months ago
Correct answer
upvoted 5 times
...
ANDRESCB1988
2 years, 9 months ago
correct
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago