• Post author:
  • Post category:Updated
  • Reading time:2 mins read
  • Post last modified:June 12, 2024

What are two evasion methods used by hackers? (Choose two.)

  • encryption
  • phishing
  • access attack
  • resource exhaustion
  • scanning
Answers Explanation & Hints:

The following methods are used by hackers to avoid detection:

Encryption and tunneling – hide or scramble the malware content
Resource exhaustion – keep the host device too busy to detect the invasion
Traffic fragmentation – split the malware into multiple packets
Protocol-level misinterpretation – sneak by the firewall
Pivot – use a compromised network device to attempt access to another device
Rootkit – allow the hacker to avoid detection as well as hide software installed by the hacker

For more Questions and Answers:

CyberOps Associate 1.02 & CA v1.0 Modules 13 – 17: Threats and Attacks Group Exam Answers Full 100%

Network Security 1.0 Modules 1-4: Securing Networks Group Exam Answers Full 100%

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments