Posted by: Pdfprep
Post Date: November 1, 2020
Charles, a network penetration tester, is part of a team assessing the security of perimeter devices of an organization.
He is using the following Nmap command to bypass the firewall:
nmap -D 10.10.8.5, 192.168.168.9, 10.10.10.12
What Charles is trying to do?
A . Packet Fragmentation
B . Cloaking a scan with decoys
C . Spoofing source address
D . Spoofing source port number
Answer: C
Leave a Reply