CompTIA PenTest+ PT0-002 Practice Question

During a vulnerability scan, you need to ensure that the scanning activities are as discreet as possible. Which protocol would be preferable for stealth scanning to reduce the chance of detection by network security devices?

  • Transmission Control Protocol (TCP) scan

  • TCP connect scan

  • TCP SYN (half-open) scan

  • User Datagram Protocol (UDP) scan

CompTIA PenTest+ PT0-002
Information Gathering and Vulnerability Scanning
Your Score:
Settings & Objectives

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot