ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 151 Topic 16 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 151 Topic 16 Discussion

312-50v12 Exam Topic 16 Question 151 Discussion:
Question #: 151
Topic #: 16

During a penetration testing assignment, a Certified Ethical Hacker (CEH) used a set of scanning tools to create a profile of the target organization. The CEH wanted to scan for live hosts, open ports, and services on a target network. He used Nmap for network inventory and Hping3 for network security auditing. However, he wanted to spoof IP addresses for anonymity during probing. Which command should the CEH use to perform this task?


A.

Hping3 -110.0.0.25 --ICMP


B.

Nmap -sS -Pn -n -vw --packet-trace -p- --script discovery -T4


C.

Hping3 -S 192.168.1.1 -a 192.168.1.254 -p 22 -flood


D.

Hping3-210.0.0.25-p 80


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.