What are the scanning techniques that are used to bypass firewall rules and logging
mechanisms and disguise themselves as usual network traffic?
A.
Connect Scanning Techniques
B.
SYN Scanning Techniques
C.
Stealth Scanning Techniques
D.
Port Scanning Techniques
Explanation:
Reference:
http://wwww.pcfreak.net/tutorials/hacking_info/arkin%20network%20scanning%20technique
s.pdf(page 7