What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?
A. Packet fragmentation scanning
B. Spoof source address scanning
C. Decoy scanning
D. Idle scanning
A. Packet fragmentation scanning
B. Spoof source address scanning
C. Decoy scanning
D. Idle scanning