Free CompTIA PenTest+ PT0-002 Practice Question

When conducting a vulnerability assessment, which method would best assist a penetration tester in evading detection by a network-based anomaly detection system?

  • Sending ICMP echo requests at regular intervals

  • Scanning using only the most common ports

  • Performing a full connect scan with default settings

  • Conducting a fragmented packet scan

This question's topic:
CompTIA PenTest+ PT0-002 / 
Information Gathering and Vulnerability Scanning
Your Score:

Check or uncheck an objective to set which questions you will receive.