Multiple Choice
Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks.Which of the following attacks are more difficult to detect?
A) stealth
B) silent
C) planned
D) covert
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q33: In an ACK scan,if the attacked port
Q34: To verify if all the IP addresses
Q35: In any *NIX system,after saving a script
Q36: Which vi command deletes the current line?<br>A)
Q37: Match each item with a statement below.<br>-A
Q39: Which of the following describes a flexible
Q40: In a NULL scan,all packet flags are
Q41: If an attacker decides to implement a
Q42: Closed ports respond to a NULL scan
Q43: Nmap has a GUI front end that