New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-50 Exam - Topic 11 Question 104 Discussion

Actual exam question for Eccouncil's 312-50 exam
Question #: 104
Topic #: 11
[All 312-50 Questions]

Being a Certified Ethical Hacker (CEH), a company has brought you on board to evaluate the safety measures in place for their network system. The company uses a network time protocol server in the demilitarized zone.

During your enumeration, you decide to run a ntptrace command. Given the syntax: ntptrace [-n] [-m maxhosts] [servername/IP_address], which command usage would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Mari
2 months ago
Surprised that people still confuse ntptrace with tptrace!
upvoted 0 times
...
Ceola
2 months ago
I think A could work too, but not as well as D.
upvoted 0 times
...
Maurine
3 months ago
Isn't 5 hosts a bit too many for a quick check?
upvoted 0 times
...
Polly
3 months ago
I disagree, localhost isn't useful for tracing external servers.
upvoted 0 times
...
Eun
3 months ago
Option D is definitely the right choice!
upvoted 0 times
...
Bettina
3 months ago
I definitely recall that using localhost won't help us trace external NTP servers. I think option C is not useful for this scenario at all.
upvoted 0 times
...
Stefanie
4 months ago
I'm a bit confused about the IP address format in option B. It looks wrong, but I can't recall the exact rules for IP addresses.
upvoted 0 times
...
Georgeanna
4 months ago
I think option D is the best choice because it combines both the -n and -m flags. I saw a similar question about NTP servers in our last mock exam.
upvoted 0 times
...
Blair
4 months ago
I remember practicing with ntptrace, but I'm not entirely sure if using the -n flag is always necessary. It seems helpful, though.
upvoted 0 times
...
Hollis
4 months ago
I want to make sure I understand this correctly. The ntptrace command will let me see where the NTP server is getting its time from and follow the chain of NTP servers, right?
upvoted 0 times
...
Yuriko
4 months ago
The -n flag to output IP addresses instead of hostnames is a good idea, as the hostnames may not be resolvable. And the -m 5 limit will keep the output concise and focused on the key NTP servers.
upvoted 0 times
...
Daryl
5 months ago
I'm not sure about the difference between the -n and -m flags. Do I really need to specify the maximum number of hosts to trace?
upvoted 0 times
...
Lavonna
5 months ago
The ntptrace -n -m 5 192.168.1.1 command looks like the best option to trace the NTP server and find its time source.
upvoted 0 times
...
Jolene
11 months ago
You know, I bet the developers put in a little Easter egg in the wrong answers, just to see if we're paying attention. Better stick with D to be safe!
upvoted 0 times
Louann
10 months ago
User 2: Yeah, I agree. The other options seem like distractions. Let's go with D.
upvoted 0 times
...
Bulah
10 months ago
User 1: I think option D is the best choice for the ntptrace command.
upvoted 0 times
...
...
Boris
11 months ago
C is only good for checking the local host's time, not the network's NTP server. Gotta go with D to get the full picture.
upvoted 0 times
Miss
9 months ago
Let's go with option D, ntptrace -n -m 5 192.168.1.1, to trace the list of NTP servers connected to the network.
upvoted 0 times
...
Delmy
9 months ago
Option C is only good for checking the local host's time, not the network's NTP server. Option D gives the full picture.
upvoted 0 times
...
Georgiana
10 months ago
Using option D will provide valuable information about the accuracy and security of the time service for the network system.
upvoted 0 times
...
Tamesha
10 months ago
I agree, option D is the best choice to trace the list of NTP servers connected to the network.
upvoted 0 times
...
...
Barbra
11 months ago
Haha, B is just a typo waiting to happen. Definitely not that one.
upvoted 0 times
...
Janine
11 months ago
Option A is similar, but the -n flag is important to get the IP addresses instead of host names. Gotta make sure I can trace the full chain.
upvoted 0 times
Jenelle
10 months ago
I agree, the -n flag is essential for effective tracing. It ensures you have the necessary information to evaluate the safety measures in place for the network system.
upvoted 0 times
...
Jenelle
10 months ago
Exactly, using the -n flag will provide more informative output with IP addresses. It's crucial for tracing the full chain accurately.
upvoted 0 times
...
Jenelle
10 months ago
Option A is similar, but the -n flag is important to get the IP addresses instead of host names. Gotta make sure I can trace the full chain.
upvoted 0 times
...
...
Mollie
11 months ago
Actually, option A does not include the -n flag, which is important for outputting IP addresses. So, option D is the best choice.
upvoted 0 times
...
Lina
11 months ago
I'm not sure, but I think option A might also work for this scenario.
upvoted 0 times
...
Jules
11 months ago
I agree with Renea, that command will help trace the list of NTP servers connected to the network.
upvoted 0 times
...
Renea
11 months ago
I think the best command to use is ntptrace -n -m 5 192.168.1.1.
upvoted 0 times
...
Lanie
11 months ago
Hmm, D seems like the way to go. The -n and -m flags should give me the IP addresses and limit the trace, just what I need to find the NTP server's time source.
upvoted 0 times
Lorean
10 months ago
User 2
upvoted 0 times
...
Tiera
11 months ago
User 3: That's right, it's the best option to find the NTP server's time source.
upvoted 0 times
...
Tegan
11 months ago
User 2: Yes, the -n and -m flags will give you the IP addresses and limit the trace.
upvoted 0 times
...
Lenita
11 months ago
User 1
upvoted 0 times
...
Levi
11 months ago
User 1: D seems like the way to go.
upvoted 0 times
...
...

Save Cancel