Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam 312-50v11 topic 1 question 337 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 337
Topic #: 1
[All 312-50v11 Questions]

Which Nmap switch helps evade IDS or firewalls?

  • A. -D
  • B. -n/-R
  • C. -T
  • D. -oN/-oX/-oG
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Scryptic
Highly Voted 2 years, 7 months ago
-D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys -n/-R: Never do DNS resolution/Always resolve [default: sometimes] -o (whatever) defines the Output method -T<0-5>: Set timing template (higher is faster) So, -T0 would make the scans slower, and help evade.
upvoted 16 times
Silascarter
2 years, 5 months ago
The answer is -D (decoy).
upvoted 2 times
...
brdweek
2 years, 5 months ago
no incorrect it's Decoy, check study book, evasion topic
upvoted 5 times
...
Silascarter
2 years, 5 months ago
-T only stands for timing. The number you add (-T0 - -T5) is what now determines if it can evade IDS (-T0 being the best). So this cannot be the answer since the option did not specifically state *-T0* However, -D (decoy Scan) is solely meant for IDS evasion, so this is a better option. I hope this helps.
upvoted 11 times
...
...
victorfs
Most Recent 11 months, 2 weeks ago
Selected Answer: A
The correct option is A. Flag -D fragments packets
upvoted 1 times
victorfs
11 months, 2 weeks ago
Sorry. Use Decoys IPs.
upvoted 1 times
...
...
nuomi
1 year ago
should be -D
upvoted 1 times
...
MGRavindra
1 year, 1 month ago
See here: https://nmap.org/book/man-bypass-firewalls-ids.html Which makes option D also right. that is flags -/oN/-oX/-G true
upvoted 1 times
...
Gregman380
1 year, 4 months ago
Selected Answer: A
The only one that fits is Decoy https://www.hackingloops.com/nmap-scanning-tutorial-firewall-and-ids-evasion/
upvoted 1 times
...
Daniel8660
1 year, 6 months ago
Selected Answer: A
IDS/Firewall Evasion Techniques - IP Address Decoy IP address decoy technique refers to generating or manually specifying the IP addresses of decoys in order to evade an IDS or firewall. #Nmap -D RND:10 <target IP address> (P.359/343)
upvoted 2 times
...
atsagar
1 year, 7 months ago
Selected Answer: D
The answer is A. check this : https://nmap.org/book/man-bypass-firewalls-ids.html
upvoted 1 times
...
ritviksharma3
1 year, 9 months ago
Selected Answer: A
The answer is A. The -D stands for decoy scan
upvoted 2 times
...
MMtc
1 year, 9 months ago
Selected Answer: A
From nmap site: https://nmap.org/book/man-briefoptions.html FIREWALL/IDS EVASION AND SPOOFING: -f; --mtu <val>: fragment packets (optionally w/given MTU) -D <decoy1,decoy2[,ME],...>: Cloak a scan with decoys
upvoted 2 times
...
pabloalarconr
1 year, 10 months ago
Selected Answer: A
Correct A -D <señuelo1 [,señuelo2][,ME],...> (Esconde un sondeo con señuelos) Realiza un sondeo con señuelos. Esto hace creer que el/los equipo/s que utilice como señuelos están también haciendo un sondeo de la red. De esta manera sus IDS pueden llegar a informar de que se están realizando de 5 a 10 sondeos de puertos desde distintas direcciones IP, pero no sabrán qué dirección IP está realizando el análisis y cuáles son señuelos inocentes. Aunque esta técnica puede vencerse mediante el seguimiento del camino de los encaminadores, descarte de respuesta («response-dropping», N. del T.), y otros mecanismos activos, generalmente es una técnica efectiva para esconder su dirección IP.
upvoted 1 times
...
Average_Joe
1 year, 12 months ago
Check Nmap's official page here:https://nmap.org/book/man-bypass-firewalls-ids.html The answer, based on the available options here, would be -D (Decoy)
upvoted 1 times
...
Tasadar92
2 years ago
Selected Answer: A
Decoy scan is used to evade ids - it is the most correct option of all.
upvoted 1 times
...
DARKEDGE
2 years ago
Selected Answer: A
-D is IP address Decoy Scan to generate or manually specify IP addresses of the decoys to evade IDS/firewalls.
upvoted 1 times
...
stettin12
2 years ago
Selected Answer: C
According to "NMAP network scanning" by Gordon "Fyodor" Lyon re Timing Templates (-T) page 142: "The first two (i.e. paranoid and sneaky) are for IDS evasion."
upvoted 1 times
...
Wolfgano
2 years, 1 month ago
D Decoy
upvoted 1 times
jasonkym
1 year, 4 months ago
Do you mean option A which the answer is "-D"?
upvoted 1 times
...
...
Jong1
2 years, 1 month ago
Selected Answer: A
decoy evation IDS or Firewall
upvoted 1 times
...
Qudaz
2 years, 2 months ago
Selected Answer: D
Textbook mentions Decoy as a way of evading the firewall; the attacker generates or manually specifies IP addresses of decoys so that the IDS/firewall cannot determine the actual IP address.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...