List of questions
Related questions
Question 313 - 312-50v12 discussion
what firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?
A.
Decoy scanning
B.
Packet fragmentation scanning
C.
Spoof source address scanning
D.
Idle scanning
Your answer:
0 comments
Sorted by
Leave a comment first