New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 5 Question 91 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 91
Topic #: 5
[All CPEH-001 Questions]

What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

Show Suggested Answer Hide Answer
Suggested Answer: E

This is a buffer overflow with it's payload in hex format.


Contribute your Thoughts:

0/2000 characters
Rusty
3 months ago
Nope, it's definitely not Blind Scanning.
upvoted 0 times
...
Micheline
3 months ago
I thought it was Bounce Scanning at first.
upvoted 0 times
...
Diego
3 months ago
Wait, is that really how it works? Sounds sketchy.
upvoted 0 times
...
Rozella
4 months ago
Agree, it's a clever method.
upvoted 0 times
...
Buddy
4 months ago
That's definitely Idle Scanning!
upvoted 0 times
...
Laquanda
4 months ago
I definitely recall Idle Scanning being the method that uses spoofed packets and checks the IPID. I hope that's the right choice!
upvoted 0 times
...
Lindsey
4 months ago
I’m a bit confused. I thought Blind Scanning was related to stealth techniques, but now I’m not so certain.
upvoted 0 times
...
Daniel
4 months ago
I remember practicing a question about port scanning methods, and Idle Scanning was mentioned there too. It involves using a zombie system, right?
upvoted 0 times
...
Ilda
5 months ago
I think the answer might be Idle Scanning, but I'm not completely sure. It sounds familiar from the study materials.
upvoted 0 times
...
Salome
5 months ago
Yep, Idle Scanning is the way to go. It's a clever technique that can be effective for bypassing firewalls and hiding your identity.
upvoted 0 times
...
Luis
5 months ago
I'm pretty sure this is Idle Scanning. The key is using a zombie system to monitor the IPID changes and infer information about the target.
upvoted 0 times
...
Hui
5 months ago
Wait, I'm a little confused. Is this the same as bounce scanning, where you use an intermediary system to bounce your scans? Or is it something different?
upvoted 0 times
...
Allene
5 months ago
Okay, I remember learning about this in class. I think it's called Idle Scanning, where you use a zombie system to hide your real IP address.
upvoted 0 times
...
Carin
5 months ago
Hmm, this one seems tricky. I'll have to think through the different port scanning methods and which one involves spoofed packets and monitoring a zombie system.
upvoted 0 times
...
Kris
5 months ago
This looks like a pretty straightforward finance problem. I'll need to calculate the before-tax cost of the debt financing, considering the coupon rate, flotation costs, and tax rate.
upvoted 0 times
...
Virgie
5 months ago
I've done this before, so I'm pretty confident I know the right sequence. I'll just need to refresh my memory on the exact file names and locations.
upvoted 0 times
...
Rhea
5 months ago
Okay, I think I've got this. The key is that in a BYOD environment, the organization has less control over the devices, so they need to rely more on users following policies. The other statements don't seem quite right.
upvoted 0 times
...
Karan
10 months ago
Hmm, Bounce Scanning? Nah, that's way too obvious. Gotta be Idle Scanning for the win. It's like the stealth mode of port scanning.
upvoted 0 times
Brett
9 months ago
Idle Scanning it is then, let's go with that.
upvoted 0 times
...
Felicitas
9 months ago
Definitely Idle Scanning, it's all about being stealthy.
upvoted 0 times
...
Rolland
10 months ago
Yeah, I agree. Bounce Scanning seems too obvious.
upvoted 0 times
...
Julio
10 months ago
I think it's Idle Scanning, it's like the stealth mode of port scanning.
upvoted 0 times
...
...
Jordan
10 months ago
B) Idle Scanning. Definitely the way to go if you want to stay under the radar. This one's gonna take some serious ninja skills to pull off.
upvoted 0 times
...
Mitsue
10 months ago
Hmm, I see your point. But I still think it's B) Idle Scanning because of the IPID adjustment.
upvoted 0 times
...
Clemencia
10 months ago
I disagree, I believe it is C) Bounce Scanning.
upvoted 0 times
...
Mitsue
11 months ago
I think the answer is B) Idle Scanning.
upvoted 0 times
...
Malinda
11 months ago
Idle Scanning, huh? Gotta love how hackers get creative with their techniques. It's like a high-tech game of cat and mouse.
upvoted 0 times
Lonny
10 months ago
Definitely a constant battle between hackers and security experts.
upvoted 0 times
...
Samira
10 months ago
Idle scanning is definitely a clever technique, but it can be hard to detect.
upvoted 0 times
...
Joanna
10 months ago
Yeah, hackers are always finding new ways to stay ahead of security measures.
upvoted 0 times
...
Roslyn
10 months ago
It's crazy how they can manipulate the IPID to gather information without being detected.
upvoted 0 times
...
Helaine
10 months ago
I heard Idle Scanning is pretty sneaky, using a third party to hide their tracks.
upvoted 0 times
...
Sharan
10 months ago
Yeah, hackers are always finding new ways to stay ahead of security measures.
upvoted 0 times
...
...
Una
11 months ago
Whoa, this one's a doozy! Zombie systems, spoofed packets, and IPID adjustments? Sounds like a real horror movie plot.
upvoted 0 times
...

Save Cancel