An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next? A. Send a PSH packet to inform the receiving application about the buffered data. B. Conduct a vulnerability scan on the open port to identify any potential weaknesses. C. Scan another port on the same host using the SYN, ACK, and first flags. D. Send a FIN or first packet to close the connection. Correct Answer: D This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer