Posted by: Pdfprep
Post Date: November 5, 2020
Which statement about stealth scan is true?
A . It evades network auditing tools
B . It relies on ICMP "port unreachable" message to determine if the port is open
C . It is used to find the ports that already have an existing vulnerability to exploit
D . It checks the firewall deployment in the path
E . It never opens a full TCP connection
F . It is a directed scan to a known TCP/UDP port
Answer: A
Leave a Reply