List of questions
Related questions
Question 348 - 312-38 discussion
What is needed for idle scan a closed port the next steps? Each correct answer represents a part of the solution. Choose all that apply.
A.
Zombie ignores unsolicited RST, and IP ID remains unchanged.
B.
The attacker sends a SYN/ACK zombie.
C.
In response to the SYN, the target to send RST.
D.
Zombie IP ID will increase by only 1.
E.
Zombie IP ID 2 rises.
Your answer:
0 comments
Sorted by
Leave a comment first