Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?
Network segmentation isolates network zones for security, but certain techniques can circumvent these controls, a focus of CNSP penetration testing.
Why D is correct:
A: DNS tunneling encodes data in DNS queries, bypassing segmentation via legitimate DNS traffic.
B: VLAN hopping exploits switch misconfigurations (e.g., double tagging) to access other VLANs.
C: Covert channels use hidden communication paths (e.g., timing channels) to evade segmentation.
All are valid techniques per CNSP for testing segmentation controls.
Why other options are incomplete: A, B, or C alone exclude other viable methods, making D the comprehensive answer.
Nguyet
4 days agoTegan
9 days agoMargery
15 days agoRuby
1 month agoAgustin
1 month agoLynelle
1 month agoJarod
2 months agoTarra
2 months agoLeila
2 months agoRonna
2 months agoKristeen
2 months agoSherell
2 months agoCasandra
3 months agoLorean
3 months agoKathrine
3 months agoMarilynn
3 months agoWillard
4 months agoIvette
4 months agoCandra
4 months agoLonna
4 months agoCecil
3 months agoMarilynn
4 months ago