Certified Ethical Hacker v11 312-50v11 – Question228

What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

A.
Packet fragmentation scanning
B. Spoof source address scanning
C. Decoy scanning
D. Idle scanning

Correct Answer: D