Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

GAQM CPEH-001 Exam - Topic 5 Question 91 Discussion

Actual exam question for GAQM's CPEH-001 exam
Question #: 91
Topic #: 5
[All CPEH-001 Questions]

What port scanning method involves sending spoofed packets to a target system and then looking for adjustments to the IPID on a zombie system?

Show Suggested Answer Hide Answer
Suggested Answer: E

This is a buffer overflow with it's payload in hex format.


Contribute your Thoughts:

0/2000 characters
Rusty
5 months ago
Nope, it's definitely not Blind Scanning.
upvoted 0 times
...
Micheline
6 months ago
I thought it was Bounce Scanning at first.
upvoted 0 times
...
Diego
6 months ago
Wait, is that really how it works? Sounds sketchy.
upvoted 0 times
...
Rozella
6 months ago
Agree, it's a clever method.
upvoted 0 times
...
Buddy
6 months ago
That's definitely Idle Scanning!
upvoted 0 times
...
Laquanda
7 months ago
I definitely recall Idle Scanning being the method that uses spoofed packets and checks the IPID. I hope that's the right choice!
upvoted 0 times
...
Lindsey
7 months ago
I’m a bit confused. I thought Blind Scanning was related to stealth techniques, but now I’m not so certain.
upvoted 0 times
...
Daniel
7 months ago
I remember practicing a question about port scanning methods, and Idle Scanning was mentioned there too. It involves using a zombie system, right?
upvoted 0 times
...
Ilda
7 months ago
I think the answer might be Idle Scanning, but I'm not completely sure. It sounds familiar from the study materials.
upvoted 0 times
...
Salome
7 months ago
Yep, Idle Scanning is the way to go. It's a clever technique that can be effective for bypassing firewalls and hiding your identity.
upvoted 0 times
...
Luis
7 months ago
I'm pretty sure this is Idle Scanning. The key is using a zombie system to monitor the IPID changes and infer information about the target.
upvoted 0 times
...
Hui
7 months ago
Wait, I'm a little confused. Is this the same as bounce scanning, where you use an intermediary system to bounce your scans? Or is it something different?
upvoted 0 times
...
Allene
7 months ago
Okay, I remember learning about this in class. I think it's called Idle Scanning, where you use a zombie system to hide your real IP address.
upvoted 0 times
...
Carin
7 months ago
Hmm, this one seems tricky. I'll have to think through the different port scanning methods and which one involves spoofed packets and monitoring a zombie system.
upvoted 0 times
...
Kris
7 months ago
This looks like a pretty straightforward finance problem. I'll need to calculate the before-tax cost of the debt financing, considering the coupon rate, flotation costs, and tax rate.
upvoted 0 times
...
Virgie
7 months ago
I've done this before, so I'm pretty confident I know the right sequence. I'll just need to refresh my memory on the exact file names and locations.
upvoted 0 times
...
Rhea
8 months ago
Okay, I think I've got this. The key is that in a BYOD environment, the organization has less control over the devices, so they need to rely more on users following policies. The other statements don't seem quite right.
upvoted 0 times
...
Karan
1 year ago
Hmm, Bounce Scanning? Nah, that's way too obvious. Gotta be Idle Scanning for the win. It's like the stealth mode of port scanning.
upvoted 0 times
Brett
12 months ago
Idle Scanning it is then, let's go with that.
upvoted 0 times
...
Felicitas
12 months ago
Definitely Idle Scanning, it's all about being stealthy.
upvoted 0 times
...
Rolland
1 year ago
Yeah, I agree. Bounce Scanning seems too obvious.
upvoted 0 times
...
Julio
1 year ago
I think it's Idle Scanning, it's like the stealth mode of port scanning.
upvoted 0 times
...
...
Jordan
1 year ago
B) Idle Scanning. Definitely the way to go if you want to stay under the radar. This one's gonna take some serious ninja skills to pull off.
upvoted 0 times
...
Mitsue
1 year ago
Hmm, I see your point. But I still think it's B) Idle Scanning because of the IPID adjustment.
upvoted 0 times
...
Clemencia
1 year ago
I disagree, I believe it is C) Bounce Scanning.
upvoted 0 times
...
Mitsue
1 year ago
I think the answer is B) Idle Scanning.
upvoted 0 times
...
Malinda
1 year ago
Idle Scanning, huh? Gotta love how hackers get creative with their techniques. It's like a high-tech game of cat and mouse.
upvoted 0 times
Lonny
1 year ago
Definitely a constant battle between hackers and security experts.
upvoted 0 times
...
Samira
1 year ago
Idle scanning is definitely a clever technique, but it can be hard to detect.
upvoted 0 times
...
Joanna
1 year ago
Yeah, hackers are always finding new ways to stay ahead of security measures.
upvoted 0 times
...
Roslyn
1 year ago
It's crazy how they can manipulate the IPID to gather information without being detected.
upvoted 0 times
...
Helaine
1 year ago
I heard Idle Scanning is pretty sneaky, using a third party to hide their tracks.
upvoted 0 times
...
Sharan
1 year ago
Yeah, hackers are always finding new ways to stay ahead of security measures.
upvoted 0 times
...
...
Una
1 year ago
Whoa, this one's a doozy! Zombie systems, spoofed packets, and IPID adjustments? Sounds like a real horror movie plot.
upvoted 0 times
...

Save Cancel