nerdexam
EC-CouncilEC-Council

312-50V13 · Question #615

312-50V13 Question #615: Real Exam Question with Answer & Explanation

Sign in or unlock 312-50V13 to reveal the answer and full explanation for question #615. The question stem and answer options stay visible for context.

Submitted by certguy· Mar 6, 2026Vulnerability Analysis

Question

An ethical hacker is performing a network scan to evaluate the security of a company's IT infrastructure. During the scan, he discovers an active host with multiple open ports running various services. The hacker uses TCP communication flags to establish a connection with the host and starts communicating with it. He sends a SYN packet to a port on the host and receives a SYN/ACK packet back. He then sends an ACK packet for the received SYN/ACK packet, which triggers an open connection. Which of the following actions should the ethical hacker perform next?

Options

  • ASend a PSH packet to inform the receiving application about the buffered data.
  • BConduct a vulnerability scan on the open port to identify any potential weaknesses.
  • CScan another port on the same host using the SYN, ACK, and RST flags.
  • DSend a FIN or RST packet to close the connection.

Unlock 312-50V13 to see the answer

You've previewed enough free 312-50V13 questions. Unlock 312-50V13 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.

Topics

#TCP handshake#port scanning#vulnerability scan#network assessment
Full 312-50V13 PracticeBrowse All 312-50V13 Questions