Certified Ethical Hacker 312-50v10 – Question175

The following is part of a log file taken from the machine on the network with the IP address of

What type of activity has been logged?

Port scan targeting
B. Teardrop attack targeting
C. Denial of service attack targeting
D. Port scan targeting

Correct Answer: D