John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in
company’s server using a port scanner. However, he does not want to establish a full TCP
connection. Which of the following scanning techniques will he use to accomplish this task?
A.
TCP FIN
B.
Xmas tree
C.
TCP SYN/ACK
D.
TCP SYN