What are two evasion techniques that are used by hackers? (Choose two.)
- pivot
- reconnaissance
- rootkit
- Trojan horse
- phishing
Explanation: The following methods are used by hackers to avoid detection:Encryption and tunneling – hide or scramble the malware content
Resource exhaustion – keeps the host device too busy to detect the invasion
Traffic fragmentation – splits the malware into multiple packets
Protocol-level misinterpretation – sneaks by the firewall
Pivot – uses a compromised network device to attempt access to another device
Rootkit – allows the hacker to be undetected and hides software installed by the hacker
Exam with this question: CCNA Cyber Ops Final Exam Answers
Exam with this question: CyberOps Associate Final Exam Answers
Please login or Register to submit your answer