New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 217 Topic 22 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 217 Topic 22 Discussion

312-50v13 Exam Topic 22 Question 217 Discussion:
Question #: 217
Topic #: 22

While analyzing suspicious network activity, you observe a slow, stealthy scanning technique that is difficult to trace back to the attacker. Which scenario best describes the scanning technique being used?


A.

The attacker sends FIN packets to infer port states based on responses


B.

The attacker uses a “zombie” machine to perform scans, hiding their true identity


C.

The attacker performs full TCP connect scans on all ports


D.

The attacker sends packets with all TCP flags set


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.