When conducting a vulnerability assessment, which method would best assist a penetration tester in evading detection by a network-based anomaly detection system?
Conducting a fragmented packet scan
Scanning using only the most common ports
Sending ICMP echo requests at regular intervals
Performing a full connect scan with default settings