GIAC Certified Incident Handler GCIH Question # 32 Topic 4 Discussion

GIAC Certified Incident Handler GCIH Question # 32 Topic 4 Discussion

GCIH Exam Topic 4 Question 32 Discussion:
Question #: 32
Topic #: 4

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to perform a stealth scan to discover open ports and applications running on the We-are-secure server. For this purpose, he wants to initiate scanning with the IP address of any third party. Which of the following scanning techniques will John use to accomplish his task?


A.

RPC


B.

IDLE


C.

UDP


D.

TCP SYN/ACK


Get Premium GCIH Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.