Karen was running port scans on each machine of her network in order to identify suspicious ports on the target machines. She observed the following results during the port scan of a particular machine.
A) Some of the ports were not being acknowledged, i.e. no acknowledgment from the target machine II. Some ports were responding with SYN + ACK packets III. Some ports were responding with an RST packet What should she interpret for the ports that did not return the acknowledgement?
B) She should that those ports as Closed ports
C) She should that those ports as Open ports
D) She should that those ports as Stealth ports
E) She should that those ports as Half Open ports
Correct Answer:
Verified
Q301: Which of the following statements highlights the
Q302: The security team found the network switch
Q303: George, a reputed ethical hacker and penetration
Q304: A company identified critical vulnerability in its
Q305: A recent study from HyThech Technologies found
Q307: Which of the following information security acts
Q308: Clark, a professional hacker, decided to bring
Q309: John is a network administrator and he
Q310: GenSec Inc, a UK-based company, uses Oracle
Q311: Adam is working as a senior penetration
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents