CompTIA PenTest+ PT0-002 Practice Question
When conducting a vulnerability assessment, which method would best assist a penetration tester in evading detection by a network-based anomaly detection system?
Performing a full connect scan with default settings
Sending ICMP echo requests at regular intervals
Scanning using only the most common ports
Conducting a fragmented packet scan