ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 118 Topic 12 Discussion

ECCouncil Ethical Hacking and Countermeasures V8 EC0-350 Question # 118 Topic 12 Discussion

EC0-350 Exam Topic 12 Question 118 Discussion:
Question #: 118
Topic #: 12

You are attempting to map out the firewall policy for an organization. You discover your target system is one hop beyond the firewall. Using hping2, you send SYN packets with the exact TTL of the target system starting at port 1 and going up to port 1024. What is this process known as?


A.

Footprinting


B.

Firewalking


C.

Enumeration


D.

Idle scanning


Get Premium EC0-350 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.