The infected machine looks for new vulnerable machines in its own local network

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

The infected machine looks for new vulnerable machines in its own local network

Explanation:
Malware propagation within a local network relies on scanning the addresses of hosts that share the same subnet to find vulnerable machines and spread quickly. By looking only at the local subnet (the IP range defined by the infected host’s network mask), the worm can reach nearby devices with minimal delay and network traffic, and with a high chance of similar configurations and services being present. This targeted local scanning is more efficient for spreading inside a LAN than casting wide, random searches across the internet or relying on a precompiled list of targets. The behavior described fits local subnet scanning best because the search is confined to the infected machine’s own network segment.

Malware propagation within a local network relies on scanning the addresses of hosts that share the same subnet to find vulnerable machines and spread quickly. By looking only at the local subnet (the IP range defined by the infected host’s network mask), the worm can reach nearby devices with minimal delay and network traffic, and with a high chance of similar configurations and services being present. This targeted local scanning is more efficient for spreading inside a LAN than casting wide, random searches across the internet or relying on a precompiled list of targets. The behavior described fits local subnet scanning best because the search is confined to the infected machine’s own network segment.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy