ExamGecko
Question list
Search
Search

List of questions

Search

Related questions











Question 348 - PT0-002 discussion

Report
Export

A penetration tester is trying to bypass an active response tool that blocks IP addresses that have more than 100 connections per minute. Which of the following commands would allow the tester to finish the test without being blocked?

A.
nmap -sU -p 1-1024 10.0.0.15
Answers
A.
nmap -sU -p 1-1024 10.0.0.15
B.
nmap -p 22,25, 80, 3389 -T2 10.0.0.15 -Pn
Answers
B.
nmap -p 22,25, 80, 3389 -T2 10.0.0.15 -Pn
C.
nmap -T5 -p 1-65535 -A 10.0.0.15
Answers
C.
nmap -T5 -p 1-65535 -A 10.0.0.15
D.
nmap -T3 -F 10.0.0.15
Answers
D.
nmap -T3 -F 10.0.0.15
Suggested answer: B

Explanation:

The -T2 flag in Nmap sets the timing template to ''polite'', which means that Nmap will limit the number of parallel probes to 10 and the scan delay to 0.4 seconds. This will reduce the number of connections per minute and avoid triggering the active response tool. The -Pn flag tells Nmap to skip the host discovery phase and scan the target regardless of its ping response. The other options are not suitable for bypassing the active response tool, as they either scan too many ports (-sU, -T5, -F) or use a faster timing template (-T5, -T3) that will generate more connections per minute.

Reference:

* Nmap Cheat Sheet 2024: All the Commands & Flags - StationX

* Nmap Commands - 17 Basic Commands for Linux Network - phoenixNAP

* NMAP Flag Guide: What They Are, When to Use Them - CBT Nuggets

asked 02/10/2024
Ana Roque
36 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first