Which tactic describes scanning the number of hosts in the target network in a random order to reach targets beyond a firewall?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which tactic describes scanning the number of hosts in the target network in a random order to reach targets beyond a firewall?

Explanation:
This tactic focuses on avoiding predictable scanning patterns by probing hosts in no fixed order. Firewalls and IDS often look for orderly, rapid sweeps across a range of addresses; a sequential scan can be flagged or throttled. By choosing the next target host at random, the activity appears less like a deliberate blanket probe and more like irregular, opportunistic discovery. That randomness helps probe hosts beyond the firewall's boundary, increasing the chances of reaching responsive hosts without triggering strict defenses. The other options don’t describe this approach: manipulating TTL values is used for OS fingerprinting or reachability tricks, not for changing the scan order; introducing decoy addresses aims to confuse defenders but doesn’t address the order of targeting; crafting custom packets is a general tool capability, not the specific tactic of randomizing target selection.

This tactic focuses on avoiding predictable scanning patterns by probing hosts in no fixed order. Firewalls and IDS often look for orderly, rapid sweeps across a range of addresses; a sequential scan can be flagged or throttled. By choosing the next target host at random, the activity appears less like a deliberate blanket probe and more like irregular, opportunistic discovery. That randomness helps probe hosts beyond the firewall's boundary, increasing the chances of reaching responsive hosts without triggering strict defenses.

The other options don’t describe this approach: manipulating TTL values is used for OS fingerprinting or reachability tricks, not for changing the scan order; introducing decoy addresses aims to confuse defenders but doesn’t address the order of targeting; crafting custom packets is a general tool capability, not the specific tactic of randomizing target selection.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy