New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 231 Topic 24 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 231 Topic 24 Discussion

312-50v13 Exam Topic 24 Question 231 Discussion:
Question #: 231
Topic #: 24

A penetration tester needs to map open ports on a target network without triggering the organization’s intrusion detection systems (IDS), which are configured to detect standard scanning patterns and abnormal traffic volumes. To achieve this, the tester decides to use a method that leverages a third-party host to obscure the origin of the scan. Which scanning technique should be employed to accomplish this stealthily?


A.

Conduct a TCP FIN scan with randomized port sequences


B.

Perform a TCP SYN scan using slow-timing options


C.

Execute a UDP scan with packet fragmentation


D.

Use an Idle scan by exploiting a "zombie" host


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.