ExamGecko
Question list
Search
Search

Question 122 - PCCET discussion

Report
Export

Which method is used to exploit vulnerabilities, services, and applications?

A.
encryption
Answers
A.
encryption
B.
port scanning
Answers
B.
port scanning
C.
DNS tunneling
Answers
C.
DNS tunneling
D.
port evasion
Answers
D.
port evasion
Suggested answer: D

Explanation:

Attack communication traffic is usually hidden with various techniques and tools, including:

Encryption with SSL, SSH (Secure Shell), or some other custom or proprietary encryption

Circumvention via proxies, remote access tools, or tunneling. In some instances, use of cellular networks enables complete circumvention of the target network for attack C2 traffic.

Port evasion using network anonymizers or port hopping to traverse over any available open ports

Fast Flux (or Dynamic DNS) to proxy through multiple infected endpoints or multiple, ever-changing C2 servers to reroute traffic and make determination of the true destination or attack source difficult DNS tunneling is used for C2 communications and data infiltration

asked 23/09/2024
Rambo Jhon
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first