Which statement about stealth scan is true?

Which statement about stealth scan is true?
A . It evades network auditing tools
B . It relies on ICMP "port unreachable" message to determine if the port is open
C . It is used to find the ports that already have an existing vulnerability to exploit
D . It checks the firewall deployment in the path
E . It never opens a full TCP connection
F . It is a directed scan to a known TCP/UDP port

Answer: A



Latest 400-251 Dumps Valid Version with 124 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments