What are two evasion techniques that are used by hackers? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhat are two evasion techniques that are used by hackers? (Choose two.)

What are two evasion techniques that are used by hackers? (Choose two.)

  • pivot
  • reconnaissance
  • rootkit
  • Trojan horse
  • phishing

Explanation: The following methods are used by hackers to avoid detection:Encryption and tunneling – hide or scramble the malware content
Resource exhaustion – keeps the host device too busy to detect the invasion
Traffic fragmentation – splits the malware into multiple packets
Protocol-level misinterpretation – sneaks by the firewall
Pivot – uses a compromised network device to attempt access to another device
Rootkit – allows the hacker to be undetected and hides software installed by the hacker

Exam with this question: CCNA Cyber Ops Final Exam Answers
Exam with this question: CyberOps Associate Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x