Which of the following scanning techniques will he use to accomplish this task?

John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in
company’s server using a port scanner. However, he does not want to establish a full TCP
connection. Which of the following scanning techniques will he use to accomplish this task?

John works as an Ethical Hacker for company Inc. He wants to find out the ports that are open in
company’s server using a port scanner. However, he does not want to establish a full TCP
connection. Which of the following scanning techniques will he use to accomplish this task?

A.
TCP FIN

B.
Xmas tree

C.
TCP SYN/ACK

D.
TCP SYN



Leave a Reply 0

Your email address will not be published. Required fields are marked *