PrepAway - Latest Free Exam Questions & Answers

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise th

What are the scanning techniques that are used to bypass firewall rules and logging
mechanisms and disguise themselves as usual network traffic?

PrepAway - Latest Free Exam Questions & Answers

A.
Connect Scanning Techniques

B.
SYN Scanning Techniques

C.
Stealth Scanning Techniques

D.
Port Scanning Techniques

Explanation:

Reference:
http://wwww.pcfreak.net/tutorials/hacking_info/arkin%20network%20scanning%20technique
s.pdf(page 7

4 Comments on “What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and disguise th

  1. Q  says:

    According to ECSAv8, Module 10, Page 323, the answer is indeed C.

    However, B. SYN Scanning techniques fall into this category (scanning techniques used to bypass firewall rules and logging mechanisms and disguise themselves as usual network traffic), too.


Leave a Reply