What are two evasion methods used by hackers? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhat are two evasion methods used by hackers? (Choose two.)

What are two evasion methods used by hackers? (Choose two.)

  • scanning
  • access attack
  • resource exhaustion
  • phishing
  • encryption

Explanation: The following methods are used by hackers to avoid detection:Encryption and tunneling – hide or scramble the malware content
Resource exhaustion – keep the host device too busy to detect the invasion
Traffic fragmentation – split the malware into multiple packets
Protocol-level misinterpretation – sneak by the firewall
Pivot – use a compromised network device to attempt access to another device
Rootkit – allow the hacker to avoid detection as well as hide software installed by the hacker

Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers
Exam with this question: Modules 13 - 17: Threats and Attacks Group Exam
Exam with this question: Modules 1 - 4: Securing Networks Group Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x