Which statement about stealth scan is true?

Posted by: Pdfprep Category: 400-251 Tags: , ,

Which statement about stealth scan is true?
A . It evades network auditing tools
B . It relies on ICMP "port unreachable" message to determine if the port is open
C . It is used to find the ports that already have an existing vulnerability to exploit
D . It checks the firewall deployment in the path
E . It never opens a full TCP connection
F . It is a directed scan to a known TCP/UDP port

Answer: A



Leave a Reply

Your email address will not be published.