ECCouncil Exam Questions

What are the scanning techniques that are used to bypass firewall rules and logging mechanisms and d

What are the scanning techniques that are used to bypass firewall rules and logging
mechanisms and disguise themselves as usual network traffic?

A.
Connect Scanning Techniques

B.
SYN Scanning Techniques

C.
Stealth Scanning Techniques

D.
Port Scanning Techniques

Explanation:

Reference:
http://wwww.pcfreak.net/tutorials/hacking_info/arkin%20network%20scanning%20technique
s.pdf(page 7