An ethical hacker is preparing to scan a network to identify live systems. To increase the efficiency and accuracy of his scans, he is considering several different host discovery techniques. He expects several unused IP addresses at any given time, specifically within the private address range of the LAN, but he also anticipates the presence of restrictive rewalls that may conceal active devices. Which scanning method would be most effective in this situation? A. ICMP ECHO Ping Sweep B. ICMP Timestamp Ping C. TCP SYN Ping D. ARP Ping Scan Correct Answer: D This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer