Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of these scans on Nmap would allow one to use someone else's computer to scan some other host on the network?
Idle zombie scan
Idle slave scan
Decoy scan
None of these
The idle zombie scan is used, in which an idle zombie computer is used to scan another computer on the network. [Argument: This is incorrect. The IDLE zombie doesn't actually scan anything, it simply receives responses from the target machine. The actual scan is still originating from the attacker machine however it's conducted using a spoofed source IP (that of the zombie). Needs revision.]
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.