What port scanning method involves sending spoofed packets to a target system and then looking
for adjustments to the IPID on a zombie system?
A.
Blind Port Scanning
B.
Idle Scanning
C.
Bounce Scanning
D.
Stealth Scanning
E.
UDP Scanning
What port scanning method involves sending spoofed packets to a target system and then looking
for adjustments to the IPID on a zombie system?
What port scanning method involves sending spoofed packets to a target system and then looking
for adjustments to the IPID on a zombie system?
A.
Blind Port Scanning
B.
Idle Scanning
C.
Bounce Scanning
D.
Stealth Scanning
E.
UDP Scanning