Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 33 Topic 4 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 33 Topic 4 Discussion

312-50v13 Exam Topic 4 Question 33 Discussion:
Question #: 33
Topic #: 4

During a red team operation on a segmented enterprise network, the testers discover that the organization’s perimeter devices deeply inspect only connection-initiation packets (such as TCP SYN and HTTP requests). Response packets and ACK packets within established sessions, however, are minimally inspected. The red team needs to covertly transmit payloads to an internal compromised host by blending into normal session traffic. Which approach should they take to bypass these defensive mechanisms?


A.

Port knocking


B.

SYN scanning


C.

ICMP flooding


D.

ACK tunneling


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.