EC-CouncilEC-Council
312-50V12 · Question #318
312-50V12 Question #318: Real Exam Question with Answer & Explanation
The correct answer is D: Checking if the remote host is alive. Vulnerability scanners initiate their process by confirming the liveness of target hosts, ensuring subsequent resource-intensive scans are directed only at active network devices.
Submitted by lucia.co· Mar 4, 2026Reconnaissance Techniques
Question
Which is the first step followed by Vulnerability Scanners for scanning a network?
Options
- AOS Detection
- BFirewall detection
- CTCP/UDP Port scanning
- DChecking if the remote host is alive
Explanation
Vulnerability scanners initiate their process by confirming the liveness of target hosts, ensuring subsequent resource-intensive scans are directed only at active network devices.
Common mistakes.
- A. OS detection is a later stage in vulnerability scanning, occurring after a host is confirmed alive and its open ports are identified, as it relies on service banners and network responses.
- B. Firewall detection is typically integrated into the port scanning or service fingerprinting phases, rather than being the very first step before host liveness is established.
- C. TCP/UDP port scanning is a subsequent step that follows host discovery, as it is only efficient and logical to scan ports on a host that has already been identified as alive.
Concept tested. Vulnerability scanning phases; Host discovery
Topics
#vulnerability scanning#host discovery#network scanning phases#reconnaissance
Community Discussion
No community discussion yet for this question.