Ask Question
10 December, 08:23

Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic?

a. TCP connect scanning technique

b. FIN scanning technique

c. Stealth scanning technique

+5
Answers (1)
  1. 10 December, 12:13
    0
    Answer: Stealth scanning technique

    Explanation:

    Stealth Scanning technique includes the following steps:

    1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

    2. The port is assumed to be in closed state if the RST packe t is sent from the server.

    3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question ✅ “Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usual network ...” in 📘 Computers and Technology if you're in doubt about the correctness of the answers or there's no answer, then try to use the smart search and find answers to the similar questions.
Search for Other Answers