Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?
Network segmentation isolates network zones for security, but certain techniques can circumvent these controls, a focus of CNSP penetration testing.
Why D is correct:
A: DNS tunneling encodes data in DNS queries, bypassing segmentation via legitimate DNS traffic.
B: VLAN hopping exploits switch misconfigurations (e.g., double tagging) to access other VLANs.
C: Covert channels use hidden communication paths (e.g., timing channels) to evade segmentation.
All are valid techniques per CNSP for testing segmentation controls.
Why other options are incomplete: A, B, or C alone exclude other viable methods, making D the comprehensive answer.
Mattie
3 days agoNakisha
8 days agoLillian
13 days agoNguyet
18 days agoTegan
24 days agoMargery
29 days agoRuby
2 months agoAgustin
2 months agoLynelle
2 months agoJarod
2 months agoTarra
2 months agoLeila
2 months agoRonna
3 months agoKristeen
3 months agoSherell
3 months agoCasandra
3 months agoLorean
3 months agoKathrine
3 months agoMarilynn
4 months agoWillard
4 months agoIvette
4 months agoCandra
5 months agoLonna
5 months agoCecil
4 months agoMarilynn
4 months ago