nerdexam
EC-CouncilEC-Council

312-50V12 · Question #318

312-50V12 Question #318: Real Exam Question with Answer & Explanation

The correct answer is D: Checking if the remote host is alive. Vulnerability scanners initiate their process by confirming the liveness of target hosts, ensuring subsequent resource-intensive scans are directed only at active network devices.

Submitted by lucia.co· Mar 4, 2026Reconnaissance Techniques

Question

Which is the first step followed by Vulnerability Scanners for scanning a network?

Options

  • AOS Detection
  • BFirewall detection
  • CTCP/UDP Port scanning
  • DChecking if the remote host is alive

Explanation

Vulnerability scanners initiate their process by confirming the liveness of target hosts, ensuring subsequent resource-intensive scans are directed only at active network devices.

Common mistakes.

  • A. OS detection is a later stage in vulnerability scanning, occurring after a host is confirmed alive and its open ports are identified, as it relies on service banners and network responses.
  • B. Firewall detection is typically integrated into the port scanning or service fingerprinting phases, rather than being the very first step before host liveness is established.
  • C. TCP/UDP port scanning is a subsequent step that follows host discovery, as it is only efficient and logical to scan ports on a host that has already been identified as alive.

Concept tested. Vulnerability scanning phases; Host discovery

Reference. https://nmap.org/book/man-host-discovery.html

Topics

#vulnerability scanning#host discovery#network scanning phases#reconnaissance

Community Discussion

No community discussion yet for this question.

Full 312-50V12 PracticeBrowse All 312-50V12 Questions