Which type of scan uses ICMP ECHO Requests to detect live hosts?

Prepare for the Computer Hacking Forensic Investigator v11 exam. Study with flashcards and multiple choice questions. Each question includes hints and explanations. Get exam-ready efficiently!

Multiple Choice

Which type of scan uses ICMP ECHO Requests to detect live hosts?

Explanation:
Sends ICMP Echo Requests across a range of addresses to see which devices answer. That's what a ping sweep does: you probe many IPs with pings, and any host that replies is identified as live or reachable. The method hinges on the basic ping idea—an Echo Request followed by an Echo Reply. This approach is especially useful because it gives a quick map of active devices before deeper analysis. However, some hosts or networks block ICMP or rate-limit replies, so not every live device may respond. Why the other options don’t fit: traceroute (tracert) aims to map the route to a specific destination by eliciting Time Exceeded responses from routers along the path, not to enumerate all live hosts in a network. The smurf scan uses spoofed ICMP Echo Requests sent to a broadcast address to amplify traffic, which is an abuse/DoS tactic rather than a method to list live hosts. The term ping trace isn’t a standard, widely used method for discovering live hosts in a network.

Sends ICMP Echo Requests across a range of addresses to see which devices answer. That's what a ping sweep does: you probe many IPs with pings, and any host that replies is identified as live or reachable. The method hinges on the basic ping idea—an Echo Request followed by an Echo Reply.

This approach is especially useful because it gives a quick map of active devices before deeper analysis. However, some hosts or networks block ICMP or rate-limit replies, so not every live device may respond.

Why the other options don’t fit: traceroute (tracert) aims to map the route to a specific destination by eliciting Time Exceeded responses from routers along the path, not to enumerate all live hosts in a network. The smurf scan uses spoofed ICMP Echo Requests sent to a broadcast address to amplify traffic, which is an abuse/DoS tactic rather than a method to list live hosts. The term ping trace isn’t a standard, widely used method for discovering live hosts in a network.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy