Free CompTIA PenTest+ PT0-002 Practice Question

During a vulnerability scan, you need to ensure that the scanning activities are as discreet as possible. Which protocol would be preferable for stealth scanning to reduce the chance of detection by network security devices?

  • TCP connect scan

  • Transmission Control Protocol (TCP) scan

  • User Datagram Protocol (UDP) scan

  • TCP SYN (half-open) scan

This question's topic:
CompTIA PenTest+ PT0-002 / 
Information Gathering and Vulnerability Scanning
Your Score:

Check or uncheck an objective to set which questions you will receive.