What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

QuestionsCategory: 312-50v12What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?
Admin Staff asked 1 year ago
What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

A. Packet fragmentation scanning

B. Spoof source address scanning

C. Decoy scanning

D. Idle scanning










Correct Answer: D

This question is in 312-50v12 exam
For getting CEH Certificate


Next Post

Recommended

Welcome Back!

Login to your account below

Create New Account!

Fill the forms below to register

Retrieve your password

Please enter your username or email address to reset your password.