What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers? A. Packet fragmentation scanning B. Spoof source address scanning C. Decoy scanning D. Idle scanning Correct Answer: D This question is in 312-50v12 exam For getting CEH Certificate
Please login or Register to submit your answer