ECCouncil Certified Ethical Hacker Exam (CEH v11) 312-50v11 Question # 95 Topic 10 Discussion

ECCouncil Certified Ethical Hacker Exam (CEH v11) 312-50v11 Question # 95 Topic 10 Discussion

312-50v11 Exam Topic 10 Question 95 Discussion:
Question #: 95
Topic #: 10

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?


A.

Decoy scanning


B.

Packet fragmentation scanning


C.

Spoof source address scanning


D.

Idle scanning


Get Premium 312-50v11 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.