312-50V13 · Question #615
312-50V13 Question #615: Real Exam Question with Answer & Explanation
Sign in or unlock 312-50V13 to reveal the answer and full explanation for question #615. The question stem and answer options stay visible for context.
Question
An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next?
Options
- ASend a PSH packet to inform the receiving application about the buffered data.
- BConduct a vulnerability scan on the open port to identify any potential weaknesses.
- CScan another port on the same host using the SYN, ACK, and RST flags.
- DSend a FIN or RST packet to close the connection.
Unlock 312-50V13 to see the answer
You've previewed enough free 312-50V13 questions. Unlock 312-50V13 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.