What are two evasion techniques that are used by hackers? (Choose two.)

  • phishing
  • Trojan horse
  • reconnaissance
  • rootkit
  • pivot
Answers Explanation & Hints:

The following methods are used by hackers to avoid detection:Encryption and tunneling – hide or scramble the malware content
Resource exhaustion – keeps the host device too busy to detect the invasion
Traffic fragmentation – splits the malware into multiple packets
Protocol-level misinterpretation – sneaks by the firewall
Pivot – uses a compromised network device to attempt access to another device
Rootkit – allows the hacker to be undetected and hides software installed by the hacker

For more Questions and Answers:

CyberOps Associate 1.0 & CA 1.02 Final Exam Answers Full 100%