Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 145 Topic 15 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 145 Topic 15 Discussion

312-50v13 Exam Topic 15 Question 145 Discussion:
Question #: 145
Topic #: 15

A cyber adversary wants to enumerate firewall rules while minimizing noise and mimicking normal traffic behavior. Which reconnaissance technique enables mapping of firewall filtering behavior using TTL-manipulated packets?


A.

Sending ICMP Echo requests to the network ' s broadcast address


B.

Passive DNS monitoring to observe domain-to-IP relationships


C.

Conducting full SYN scans on all ports for each discovered IP


D.

Firewalking with manipulated TTL values to analyze ACL responses


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.