That is only true if you actually scanned THROUGH the zombie, to a target. Here, the question is not asking you that, it’s asking you about your connection TO THE ZOMBIE ITSELF!
(+1) for an OPEN port on Zombie
(no response) for a CLOSED port on Zombie
So the answer is correct, as Rednael is indicating.
mantosays:
DDDDDDDDDDDDDDD
Zesays:
a +2 option is available if we are talking about an attacker is using a spoofed IP address to check another target machine, and in this case there is no spoofed IP addresses in the above scenario, so it will be a +1 since the port is open
the correct answer here is B. 31402
Well… It doesn’t say that the victim has an open port, just that the zombie has an open port. 🙂
Answer is B
(+1) for CLOSED port
(+2) for an OPEN port
FILTERED ports would also be ‘+1’, same as closed ports
http://nmap.org/book/idlescan.html
That is only true if you actually scanned THROUGH the zombie, to a target. Here, the question is not asking you that, it’s asking you about your connection TO THE ZOMBIE ITSELF!
(+1) for an OPEN port on Zombie
(no response) for a CLOSED port on Zombie
So the answer is correct, as Rednael is indicating.
DDDDDDDDDDDDDDD
a +2 option is available if we are talking about an attacker is using a spoofed IP address to check another target machine, and in this case there is no spoofed IP addresses in the above scenario, so it will be a +1 since the port is open