312-50v12 Exam QuestionsBrowse all questions from this exam

312-50v12 Exam - Question 303


Which Nmap switch helps evade IDS or firewalls?

Show Answer
Correct Answer: AC

The -D switch in Nmap is used for decoy scanning. This technique involves sending packets with fake IP addresses along with the real one, making it look like multiple hosts are scanning the target. This can mislead and confuse intrusion detection systems (IDS) and firewalls, thereby helping to evade them.

Discussion

5 comments
Sign in to comment
d10f290Option: A
Feb 23, 2024

-D (decoy Scan) is solely meant for IDS evasion,

insaniuntOption: A
Feb 25, 2024

"-D" option in Nmap is used for decoy scanning

g_man_rapOption: A
Apr 29, 2024

A. -D This switch is used for "decoy scanning" in Nmap. It allows the user to include fake IP addresses in the scanning traffic, making it appear as if many different hosts are scanning the target network. This can confuse and dilute the logs that an IDS or firewall generates, making it harder to identify the real source of the scan and is a direct method for evasion.

hughnguyenOption: C
May 25, 2024

-D tells the network that there a multiple possible attackers, even though only one of them is real -T makes the attacker so quiet that the target doesn't even know it's being attacked Answer is C

yicx1Option: C
Jun 25, 2024

So Nmap offers a simpler approach, with six timing templates. You can specify them with the -T option and their number (0–5) or their name. The template names are paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5). The first two are for IDS evasion.