1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Law Incorporation [45]
3 years ago
11

Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua

l network traffic?
a. TCP connect scanning technique
b. FIN scanning technique
c. Stealth scanning technique
Computers and Technology
1 answer:
OLEGan [10]3 years ago
6 0

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

You might be interested in
What are several networks connected together using a router
elixir [45]

Answer:

local Area Network, Wide Local Area Network and Personal Area Network

8 0
3 years ago
West Point Bridge Designer | Does anyone know a way to make this bridge cost less?
e-lub [12.9K]
Make the zig zag part more spaced out
4 0
3 years ago
2. You turn on your Windows 7 computer and see the system display POST messages. Then
Anton [14]
The monitor would definitely be the problem in this scenario.
7 0
3 years ago
What is the important safety information found on a boat's capacity plate?
tigry1 [53]
Written on the boat capacity plate that is important for every captain or owner must be knowledgeable about is the maximum allowable total weight and number of passengers. This is to avoid untoward accident due to over capacity and a ticket for unsafe operation by law enforcements. 
6 0
3 years ago
According to policies and procedures, describe the process to report a hazard?
trapecia [35]
When u r in emergency
7 0
3 years ago
Read 2 more answers
Other questions:
  • HELP PLEASE
    7·2 answers
  • Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by stateme
    10·1 answer
  • Sanjay is giving a slideshow presentation on his entire college class and he is feeling quite nervous in order to share his pres
    9·1 answer
  • Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance
    10·1 answer
  • Pseudoscience is
    5·2 answers
  • What are specific and relevant terms that will help you locate information using an internet search engine?
    10·1 answer
  • PLEASE HELP ASAP!!!!!!!!!!!
    7·2 answers
  • Please help me on this I don't know which one they are​
    6·2 answers
  • An opening inside the system unit in which you can install additional equipment can be known as
    13·1 answer
  • suppose one packet switches between a sending host and a receiving host. the transmission rates between the sending host and the
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!