Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?
Network segmentation isolates network zones for security, but certain techniques can circumvent these controls, a focus of CNSP penetration testing.
Why D is correct:
A: DNS tunneling encodes data in DNS queries, bypassing segmentation via legitimate DNS traffic.
B: VLAN hopping exploits switch misconfigurations (e.g., double tagging) to access other VLANs.
C: Covert channels use hidden communication paths (e.g., timing channels) to evade segmentation.
All are valid techniques per CNSP for testing segmentation controls.
Why other options are incomplete: A, B, or C alone exclude other viable methods, making D the comprehensive answer.
Gilma
23 days agoJoaquin
28 days agoMattie
1 month agoNakisha
1 month agoLillian
1 month agoNguyet
2 months agoTegan
2 months agoMargery
2 months agoRuby
3 months agoAgustin
3 months agoLynelle
3 months agoJarod
3 months agoTarra
3 months agoLeila
3 months agoRonna
4 months agoKristeen
4 months agoSherell
4 months agoCasandra
4 months agoLorean
4 months agoKathrine
4 months agoMarilynn
5 months agoWillard
5 months agoIvette
5 months agoCandra
6 months agoLonna
6 months agoRicarda
7 days agoAbraham
12 days agoCarli
17 days agoCecil
5 months agoMarilynn
5 months ago