Which scanning technique uses ICMP echo requests to determine which hosts are up?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which scanning technique uses ICMP echo requests to determine which hosts are up?

Explanation:
ICMP echo requests are what the ping utility uses to check if a host is reachable. A ping sweep automates sending these ICMP Echo Requests across a range of IP addresses and records which ones respond with an Echo Reply, revealing which hosts are up. This technique is specifically for discovering live hosts quickly in a network. By contrast, traceroute sends probes with increasing TTL to map the path to a destination rather than just checking reachability; port scanning focuses on identifying open services on a host by probing ports; DNS poisoning involves corrupting or spoofing DNS responses, not determining whether hosts are online.

ICMP echo requests are what the ping utility uses to check if a host is reachable. A ping sweep automates sending these ICMP Echo Requests across a range of IP addresses and records which ones respond with an Echo Reply, revealing which hosts are up. This technique is specifically for discovering live hosts quickly in a network. By contrast, traceroute sends probes with increasing TTL to map the path to a destination rather than just checking reachability; port scanning focuses on identifying open services on a host by probing ports; DNS poisoning involves corrupting or spoofing DNS responses, not determining whether hosts are online.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy