ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 84 Topic 9 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 84 Topic 9 Discussion

312-50v13 Exam Topic 9 Question 84 Discussion:
Question #: 84
Topic #: 9

what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?


A.

Decoy scanning


B.

Packet fragmentation scanning


C.

Spoof source address scanning


D.

Idle scanning


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.