exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 305 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 305
Topic #: 1
[All 312-50v11 Questions]

You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: `The attacker must scan every port on the server several times using a set of spoofed source IP addresses.` Suppose that you are using
Nmap to perform this scan.
What flag will you use to satisfy this requirement?

  • A. The -g flag
  • B. The -A flag
  • C. The -f fag
  • D. The -D flag
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 1 year, 7 months ago
-D = Decoy
upvoted 12 times
...
Daniel8660
Highly Voted 6 months, 3 weeks ago
Selected Answer: D
IDS/Firewall Evasion Techniques - IP Address Decoy IP address decoy technique refers to generating or manually specifying the IP addresses of decoys in order to evade an IDS or firewall. # Nmap -D RND:10 <target IP address> (P.359/343)
upvoted 5 times
...
volatile
Most Recent 10 months, 2 weeks ago
Selected Answer: D
-D = Decoy
upvoted 3 times
...
egz21
1 year, 3 months ago
Selected Answer: D
with Nmap -D you scan spoof the source adresses!!
upvoted 2 times
...
egz21
1 year, 3 months ago
Selected Answer: D
Answer Is decoy, I attach refrence commands https://nmap.org/man/es/man-briefoptions.html
upvoted 2 times
...
stephyfresh13
1 year, 3 months ago
answer is D Nmap may be used to create decoys, that are meant to fool firewalls. whereas decoys is used for nefarious functions, it’s usually used to rectify. nmap -D 192.168.0.1,192.168.0.2,… When using the -D command, you’ll be able to follow the command with a list of decoy addresses. These decoy addresses also will show as if they’re scanning the network, to obfuscate the scan that’s actually being done. Similarly, it’s possible to use commands like “–spoof-mac” to spoof an Nmap mac address, similarly as the command “-S” to spoof a source address.
upvoted 2 times
...
ProveCert
1 year, 4 months ago
Selected Answer: A
The attacker must scan every port on the server several times using a set of spoofed source IP addresses.` Suppose that you are using Nmap to perform this scan. What flag will you use to satisfy this requirement?
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago