ExamGecko
Home / ECCouncil / 312-50v12 / Practice Test 14
Ask Question

ECCouncil 312-50v12 Practice Test 14

00:00:00
Show Answer
Report Issue   Restart test

Question 1 / 40

During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?

Become a Premium Member for full access
  Unlock Premium Member