CompTIA PenTest+ PT0-002 Practice Question
During a vulnerability scan, you need to ensure that the scanning activities are as discreet as possible. Which protocol would be preferable for stealth scanning to reduce the chance of detection by network security devices?
Transmission Control Protocol (TCP) scan
TCP SYN (half-open) scan
TCP connect scan
User Datagram Protocol (UDP) scan