The infected machine probes IP addresses randomly from the target network IP range and checks for vulnerabilities

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

The infected machine probes IP addresses randomly from the target network IP range and checks for vulnerabilities

Explanation:
Random scanning picks IP addresses from the target range in no fixed order and probes them to see if they’re alive and vulnerable. This approach is typical of fast-propagating malware, like worms, because it doesn’t rely on a pre-made list or a mapped network path. The description fits this method precisely: addresses are chosen randomly across the range, and each is checked for vulnerabilities. By contrast, hit-list scanning uses a specific precompiled list of targets, local subnet scanning concentrates on addresses within one subnet, and topological scanning focuses on uncovering the network’s structure and routing before proceeding.

Random scanning picks IP addresses from the target range in no fixed order and probes them to see if they’re alive and vulnerable. This approach is typical of fast-propagating malware, like worms, because it doesn’t rely on a pre-made list or a mapped network path. The description fits this method precisely: addresses are chosen randomly across the range, and each is checked for vulnerabilities. By contrast, hit-list scanning uses a specific precompiled list of targets, local subnet scanning concentrates on addresses within one subnet, and topological scanning focuses on uncovering the network’s structure and routing before proceeding.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy