List of questions
Related questions
Question 521 - 312-50v12 discussion
During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?
A.
Hping3 -110.0.0.25 --ICMP
B.
Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4
C.
Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood
D.
Hping3-210.0.0.25-p 80
Your answer:
0 comments
Sorted by
Leave a comment first