Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 27 Topic 3 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 27 Topic 3 Discussion

312-50v13 Exam Topic 3 Question 27 Discussion:
Question #: 27
Topic #: 3

As an IT technician in a small software development company, you are responsible for protecting the network against various cyber threats. You learn that attackers often try to bypass firewalls. Which of the following is a common technique used by attackers to evade firewall detection?


A.

Changing the source IP address of packets to make traffic appear to originate from a trusted source


B.

Using encrypted communication channels to evade network monitoring tools


C.

Using social engineering techniques to trick employees into revealing sensitive information


D.

Implementing an open-source operating system to bypass proprietary software restrictions


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.