Which statement about stealth scan is true?
Which statement about stealth scan is true?
A . It evades network auditing tools
B . It relies on ICMP "port unreachable" message to determine if the port is open
C . It is used to find the ports that already have an existing vulnerability to exploit
D . It checks the firewall deployment in the path
E . It never opens a full TCP connection
F . It is a directed scan to a known TCP/UDP port
Answer: A
Latest 400-251 Dumps Valid Version with 124 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments