What are two evasion methods used by hackers? (Choose two.)

Last Updated on April 28, 2021 by Admin

What are two evasion methods used by hackers? (Choose two.)

  • encryption
  • phishing
  • access attack
  • resource exhaustion
  • scanning
    Answers Explanation & Hints:

    The following methods are used by hackers to avoid detection:Encryption and tunneling – hide or scramble the malware content
    Resource exhaustion – keep the host device too busy to detect the invasion
    Traffic fragmentation – split the malware into multiple packets
    Protocol-level misinterpretation – sneak by the firewall
    Pivot – use a compromised network device to attempt access to another device
    Rootkit – allow the hacker to avoid detection as well as hide software installed by the hacker

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments