312-50V13 · Question #325
312-50V13 Question #325: Real Exam Question with Answer & Explanation
The correct answer is D: The -D flag. Explanation Option D (-D) is correct because the -D flag in Nmap enables decoy scanning, which sends packets from multiple spoofed (fake) source IP addresses alongside your real IP, making it appear that several different hosts are scanning the target simultaneously - directly sa
Question
You are a penetration tester and are about to perform a scan on a specific server. The agreement that you signed with the client contains the following specific condition for the scan: "The attacker must scan every port on the server several times using a set of spoofed sources IP addresses. " Suppose that you are using Nmap to perform this scan. What flag will you use to satisfy this requirement?
Options
- AThe -A flag
- BThe -g flag
- CThe -f flag
- DThe -D flag
Explanation
Explanation
Option D (-D) is correct because the -D flag in Nmap enables decoy scanning, which sends packets from multiple spoofed (fake) source IP addresses alongside your real IP, making it appear that several different hosts are scanning the target simultaneously - directly satisfying the requirement for "spoofed source IP addresses."
Why the distractors are wrong:
- Option A (-A) enables aggressive scanning (OS detection, version detection, script scanning, traceroute) - it has nothing to do with IP spoofing.
- Option B (-g) specifies a source port number to use during the scan, not spoofed IP addresses.
- Option C (-f) enables packet fragmentation, which breaks packets into smaller pieces to evade firewalls, but does not involve spoofed IPs.
Memory Tip: Think of -D as standing for "Decoy" - you're creating decoy (fake) IP addresses to disguise your scan. If you can remember "D = Decoy = disguised IPs," you'll never confuse it with the other flags. You can use it with syntax like nmap -D RND:10 [target] to generate 10 random decoy IPs.
Topics
Community Discussion
No community discussion yet for this question.