Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 102 Topic 11 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 102 Topic 11 Discussion

312-50v13 Exam Topic 11 Question 102 Discussion:
Question #: 102
Topic #: 11

During a covert red team engagement, a penetration tester is tasked with identifying live hosts in a target organization’s internal subnet (10.0.0.0/24) without triggering intrusion detection systems (IDS). To remain undetected, the tester opts to use the command nmap -sn -PE 10.0.0.0/24, which results in several "Host is up" responses, even though the organization’s IDS is tuned to detect high-volume scans. After the engagement, the client reviews the logs and is surprised that the scan was not flagged. What allowed the scan to complete without triggering alerts?


A.

It used TCP ACK packets that were allowed through.


B.

It used UDP packets that bypassed ICMP inspection.


C.

It scanned only the ports open in the firewall whitelist.


D.

It performed an ICMP Echo ping sweep without port probing.


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.