So Nmap offers a simpler approach, with six timing templates. You can specify them with the -T option and their number (0–5) or their name. The template names are paranoid (0), sneaky (1), polite (2), normal (3), aggressive (4), and insane (5). The first two are for IDS evasion.
-D tells the network that there a multiple possible attackers, even though only one of them is real
-T makes the attacker so quiet that the target doesn't even know it's being attacked
Answer is C
A. -D
This switch is used for "decoy scanning" in Nmap. It allows the user to include fake IP addresses in the scanning traffic, making it appear as if many different hosts are scanning the target network. This can confuse and dilute the logs that an IDS or firewall generates, making it harder to identify the real source of the scan and is a direct method for evasion.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
yicx1
5 months agohughnguyen
6 months agog_man_rap
7 months agoinsaniunt
9 months agod10f290
9 months ago