Free CompTIA PenTest+ PT0-002 Practice Question

When conducting a vulnerability assessment, which method would best assist a penetration tester in evading detection by a network-based anomaly detection system?

  • Conducting a fragmented packet scan

  • Scanning using only the most common ports

  • Sending ICMP echo requests at regular intervals

  • Performing a full connect scan with default settings

This question's topic:
CompTIA PenTest+ PT0-002 / 
Information Gathering and Vulnerability Scanning
Your Score:

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot