Skip to content

Certified Ethical Hacker v11 312-50v11

  • Certified Ethical Hacker v11 312-50v11

Tag: Question 228

Certified Ethical Hacker v11 312-50v11 – Question228

What firewall evasion scanning technique make use of a zombie system that has low network activity as well as its fragment identification numbers?

A.
Packet fragmentation scanning
B. Spoof source address scanning
C. Decoy scanning
D. Idle scanning

Correct Answer: D

Tagged Certified Ethical Hacker v11 312-50v11, Question 228
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!