Peter, a disgruntled ex-employee of Zapmaky Solutions Ltd., is trying to jeopardize the company's website http://zapmaky.com. He conducted the port scan of the website by using the Nmap tool to extract the information about open ports and their corresponding services. While performing the scan, he recognized that some of his requests are being blocked by the firewall deployed by the IT personnel of Zapmaky and he wants to bypass the same. For evading the firewall, he wanted to employ the stealth scanning technique which is an incomplete TCP three-way handshake method that can effectively bypass the firewall rules and logging mechanisms. Which if the following Nmap commands should Peter execute to perform stealth scanning?
A) nmap -sT -v zapmaky.com
B) nmap -T4 -A -v zapmaky.com
C) nmap -sX -T4 -A -v zapmaky.com
D) nmap -sN -A zapmaky.com
Correct Answer:
Verified
Q202: This phase will increase the odds of
Q203: An organization has deployed a web application
Q204: Jason is working on a pen testing
Q205: While scanning a server, you found rpc,
Q206: A team of cyber criminals in Germany
Q208: An organization deployed Microsoft Azure cloud services
Q209: The penetration testing team of MirTech Inc.
Q210: Michael, a Licensed Penetration Tester, wants to
Q211: Sam was asked to conduct penetration tests
Q212: A hacker initiates so many invalid requests
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents