PdfPrep.com

Which statement about stealth scan is true?

Which statement about stealth scan is true?
A . It evades network auditing tools
B . It relies on ICMP "port unreachable" message to determine if the port is open
C . It is used to find the ports that already have an existing vulnerability to exploit
D . It checks the firewall deployment in the path
E . It never opens a full TCP connection
F . It is a directed scan to a known TCP/UDP port

Answer: A



Exit mobile version