Which scanning technique uses ICMP echo requests to determine which hosts are up?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which scanning technique uses ICMP echo requests to determine which hosts are up?

Explanation:
ICMP echo requests are what the ping utility uses to check if a host is reachable. A ping sweep automates sending these ICMP Echo Requests across a range of IP addresses and records which ones respond with an Echo Reply, revealing which hosts are up. This technique is specifically for discovering live hosts quickly in a network. By contrast, traceroute sends probes with increasing TTL to map the path to a destination rather than just checking reachability; port scanning focuses on identifying open services on a host by probing ports; DNS poisoning involves corrupting or spoofing DNS responses, not determining whether hosts are online.

ICMP echo requests are what the ping utility uses to check if a host is reachable. A ping sweep automates sending these ICMP Echo Requests across a range of IP addresses and records which ones respond with an Echo Reply, revealing which hosts are up. This technique is specifically for discovering live hosts quickly in a network. By contrast, traceroute sends probes with increasing TTL to map the path to a destination rather than just checking reachability; port scanning focuses on identifying open services on a host by probing ports; DNS poisoning involves corrupting or spoofing DNS responses, not determining whether hosts are online.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy