Which tactic describes scanning the number of hosts in the target network in a random order to reach targets beyond a firewall?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which tactic describes scanning the number of hosts in the target network in a random order to reach targets beyond a firewall?

Explanation:
This tactic focuses on avoiding predictable scanning patterns by probing hosts in no fixed order. Firewalls and IDS often look for orderly, rapid sweeps across a range of addresses; a sequential scan can be flagged or throttled. By choosing the next target host at random, the activity appears less like a deliberate blanket probe and more like irregular, opportunistic discovery. That randomness helps probe hosts beyond the firewall's boundary, increasing the chances of reaching responsive hosts without triggering strict defenses. The other options don’t describe this approach: manipulating TTL values is used for OS fingerprinting or reachability tricks, not for changing the scan order; introducing decoy addresses aims to confuse defenders but doesn’t address the order of targeting; crafting custom packets is a general tool capability, not the specific tactic of randomizing target selection.

This tactic focuses on avoiding predictable scanning patterns by probing hosts in no fixed order. Firewalls and IDS often look for orderly, rapid sweeps across a range of addresses; a sequential scan can be flagged or throttled. By choosing the next target host at random, the activity appears less like a deliberate blanket probe and more like irregular, opportunistic discovery. That randomness helps probe hosts beyond the firewall's boundary, increasing the chances of reaching responsive hosts without triggering strict defenses.

The other options don’t describe this approach: manipulating TTL values is used for OS fingerprinting or reachability tricks, not for changing the scan order; introducing decoy addresses aims to confuse defenders but doesn’t address the order of targeting; crafting custom packets is a general tool capability, not the specific tactic of randomizing target selection.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy