Register
74:59
Stop
CEH - Session Hijacking
Expert
1/75
A security consulting firm has been hired to test a high-security government facility's network infrastructure. The client has specified that they use a mix of legacy systems and modern equipment. Your team has been given limited information—only that the target network uses the 192.168.50.0/24 range and has multiple security appliances in place. You need to discover active hosts while minimizing the chance of triggering alerts. The facility administrator mentioned some hosts may have unusual port configurations. What host discovery approach would be most effective in this situation?
a.
Deploy SNMP sweeps across the entire subnet with community string brute forcing to obtain detailed host information
b.
Execute a coordinated UDP and TCP scan with high packet rates to quickly identify all systems before security measures can respond
c.
Use passive ARP monitoring combined with selective TCP SYN scans to ports known to be commonly open in their environment
d.
Perform a full TCP connect scan to all ports on every potential host in the subnet to ensure complete coverage of unusual port configurations
Expert