ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 9 Topic 1 Discussion

ECCouncil EC-Council Certified Security Analyst (ECSA) v10 : Penetration Testing ECSAv10 Question # 9 Topic 1 Discussion

ECSAv10 Exam Topic 1 Question 9 Discussion:
Question #: 9
Topic #: 1

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?


A.

Connect Scanning Techniques


B.

SYN Scanning Techniques


C.

Stealth Scanning Techniques


D.

Port Scanning Techniques


Get Premium ECSAv10 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.