What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic?
A . Connect Scanning Techniques
B . SYN Scanning Techniques
C . Stealth Scanning Techniques
D . Port Scanning Techniques

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments