Multiple Choice
Using Hping, you wish to enumerate the rules of a firewall. You direct the traffic to a confirmed host and set the TTL value to one hop past the firewall, also incrementing the destination port by one with each packet. Return ICMP type 11 messages will tell you want the firewall allowed to pass.
What is this technique called?
A) Firewall footprinting
B) Firewalking
C) Firewall enumeration
D) Bounce scanning
Correct Answer:

Verified
Correct Answer:
Verified
Q20: During a traceroute, you notice that the
Q21: Janet wants a no cost solution to
Q22: Dylan found a vulnerability on a web
Q23: An SSID is: (Choose the best statement)<br>A)
Q24: Bruno wishes to carry out a session
Q26: Using netcat, cryptcat, or ncat to transfer
Q27: You just hired a new graphic artist
Q28: Which of the following tools can be
Q29: Curtis works for a small company. His
Q30: Jeremy knows that the network has been