ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 49 Topic 5 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv12) 312-50v12 Question # 49 Topic 5 Discussion

312-50v12 Exam Topic 5 Question 49 Discussion:
Question #: 49
Topic #: 5

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?


A.

Decoy scanning


B.

Packet fragmentation scanning


C.

Spoof source address scanning


D.

Idle scanning


Get Premium 312-50v12 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.