Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil 312-50 Exam - Topic 11 Question 104 Discussion

Actual exam question for Eccouncil's 312-50 exam
Question #: 104
Topic #: 11
[All 312-50 Questions]

Being a Certified Ethical Hacker (CEH), a company has brought you on board to evaluate the safety measures in place for their network system. The company uses a network time protocol server in the demilitarized zone.

During your enumeration, you decide to run a ntptrace command. Given the syntax: ntptrace [-n] [-m maxhosts] [servername/IP_address], which command usage would best serve your objective to find where the NTP server obtains the time from and to trace the list of NTP servers connected to the network?

Show Suggested Answer Hide Answer

Contribute your Thoughts:

0/2000 characters
Mari
4 months ago
Surprised that people still confuse ntptrace with tptrace!
upvoted 0 times
...
Ceola
4 months ago
I think A could work too, but not as well as D.
upvoted 0 times
...
Maurine
4 months ago
Isn't 5 hosts a bit too many for a quick check?
upvoted 0 times
...
Polly
4 months ago
I disagree, localhost isn't useful for tracing external servers.
upvoted 0 times
...
Eun
5 months ago
Option D is definitely the right choice!
upvoted 0 times
...
Bettina
5 months ago
I definitely recall that using localhost won't help us trace external NTP servers. I think option C is not useful for this scenario at all.
upvoted 0 times
...
Stefanie
5 months ago
I'm a bit confused about the IP address format in option B. It looks wrong, but I can't recall the exact rules for IP addresses.
upvoted 0 times
...
Georgeanna
5 months ago
I think option D is the best choice because it combines both the -n and -m flags. I saw a similar question about NTP servers in our last mock exam.
upvoted 0 times
...
Blair
6 months ago
I remember practicing with ntptrace, but I'm not entirely sure if using the -n flag is always necessary. It seems helpful, though.
upvoted 0 times
...
Hollis
6 months ago
I want to make sure I understand this correctly. The ntptrace command will let me see where the NTP server is getting its time from and follow the chain of NTP servers, right?
upvoted 0 times
...
Yuriko
6 months ago
The -n flag to output IP addresses instead of hostnames is a good idea, as the hostnames may not be resolvable. And the -m 5 limit will keep the output concise and focused on the key NTP servers.
upvoted 0 times
...
Daryl
6 months ago
I'm not sure about the difference between the -n and -m flags. Do I really need to specify the maximum number of hosts to trace?
upvoted 0 times
...
Lavonna
6 months ago
The ntptrace -n -m 5 192.168.1.1 command looks like the best option to trace the NTP server and find its time source.
upvoted 0 times
...
Jolene
1 year ago
You know, I bet the developers put in a little Easter egg in the wrong answers, just to see if we're paying attention. Better stick with D to be safe!
upvoted 0 times
Louann
11 months ago
User 2: Yeah, I agree. The other options seem like distractions. Let's go with D.
upvoted 0 times
...
Bulah
11 months ago
User 1: I think option D is the best choice for the ntptrace command.
upvoted 0 times
...
...
Boris
1 year ago
C is only good for checking the local host's time, not the network's NTP server. Gotta go with D to get the full picture.
upvoted 0 times
Miss
11 months ago
Let's go with option D, ntptrace -n -m 5 192.168.1.1, to trace the list of NTP servers connected to the network.
upvoted 0 times
...
Delmy
11 months ago
Option C is only good for checking the local host's time, not the network's NTP server. Option D gives the full picture.
upvoted 0 times
...
Georgiana
11 months ago
Using option D will provide valuable information about the accuracy and security of the time service for the network system.
upvoted 0 times
...
Tamesha
11 months ago
I agree, option D is the best choice to trace the list of NTP servers connected to the network.
upvoted 0 times
...
...
Barbra
1 year ago
Haha, B is just a typo waiting to happen. Definitely not that one.
upvoted 0 times
...
Janine
1 year ago
Option A is similar, but the -n flag is important to get the IP addresses instead of host names. Gotta make sure I can trace the full chain.
upvoted 0 times
Jenelle
11 months ago
I agree, the -n flag is essential for effective tracing. It ensures you have the necessary information to evaluate the safety measures in place for the network system.
upvoted 0 times
...
Jenelle
11 months ago
Exactly, using the -n flag will provide more informative output with IP addresses. It's crucial for tracing the full chain accurately.
upvoted 0 times
...
Jenelle
12 months ago
Option A is similar, but the -n flag is important to get the IP addresses instead of host names. Gotta make sure I can trace the full chain.
upvoted 0 times
...
...
Mollie
1 year ago
Actually, option A does not include the -n flag, which is important for outputting IP addresses. So, option D is the best choice.
upvoted 0 times
...
Lina
1 year ago
I'm not sure, but I think option A might also work for this scenario.
upvoted 0 times
...
Jules
1 year ago
I agree with Renea, that command will help trace the list of NTP servers connected to the network.
upvoted 0 times
...
Renea
1 year ago
I think the best command to use is ntptrace -n -m 5 192.168.1.1.
upvoted 0 times
...
Lanie
1 year ago
Hmm, D seems like the way to go. The -n and -m flags should give me the IP addresses and limit the trace, just what I need to find the NTP server's time source.
upvoted 0 times
Lorean
12 months ago
User 2
upvoted 0 times
...
Tiera
1 year ago
User 3: That's right, it's the best option to find the NTP server's time source.
upvoted 0 times
...
Tegan
1 year ago
User 2: Yes, the -n and -m flags will give you the IP addresses and limit the trace.
upvoted 0 times
...
Lenita
1 year ago
User 1
upvoted 0 times
...
Levi
1 year ago
User 1: D seems like the way to go.
upvoted 0 times
...
...

Save Cancel