A Certi ed Ethical Hacker is attempting to gather information about a target organization’s network structure through network footprinting. During the operation, they encounter ICMP blocking by the target system’s firewall. The hacker wants to ascertain the path that packets take to the host system from a source, using an alternative protocol. Which of the following actions should the hacker consider next?

QuestionsCategory: 312-50v12A Certi ed Ethical Hacker is attempting to gather information about a target organization’s network structure through network footprinting. During the operation, they encounter ICMP blocking by the target system’s firewall. The hacker wants to ascertain the path that packets take to the host system from a source, using an alternative protocol. Which of the following actions should the hacker consider next?
Admin Staff asked 1 year ago
A Certi ed Ethical Hacker is attempting to gather information about a target organization's network structure through network footprinting. During the operation, they encounter ICMP blocking by the target system's firewall. The hacker wants to ascertain the path that packets take to the host system from a source, using an alternative protocol. Which of the following actions should the hacker consider next?

A. Use UDP Traceroute in the Linux operating system by executing the 'traceroute' command with the destination IP or domain name.

B. Use the ICMP Traceroute on the Windows operating system as it is the default utility.

C. Use the ARIN Whois database search tool to find the network range of the target network.

D. Utilize the Path Analyzer Pro to trace the route from the source to the destination target systems.










Correct Answer: A

This question is in 312-50v12 exam
For getting CEH Certificate


Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.