QUESTION IMAGE
Question
what type of scan would you use to take advantage of firewall rules that may be in place to accommodate protocols like dns and ftp? a mac spoofing b fragmentation c idle scanning d source port spoofing
Idle scanning can take advantage of firewall rules that allow certain protocols like DNS and FTP. It uses a zombie host to send packets and can bypass some firewall - based restrictions by leveraging the open ports for allowed services. MAC spoofing changes the MAC address, fragmentation breaks packets into smaller pieces, and source port spoofing fakes the source port, none of which are specifically for taking advantage of such firewall - protocol accommodations as effectively as idle scanning.
Snap & solve any problem in the app
Get step-by-step solutions on Sovi AI
Photo-based solutions with guided steps
Explore more problems and detailed explanations
C. Idle scanning