Network segmentation isolates network zones for security, but certain techniques can circumvent these controls, a focus of CNSP penetration testing.
Why D is correct:
A:DNS tunneling encodes data in DNS queries, bypassing segmentation via legitimate DNS traffic.
B:VLAN hopping exploits switch misconfigurations (e.g., double tagging) to access other VLANs.
C:Covert channels use hidden communication paths (e.g., timing channels) to evade segmentation.All are valid techniques per CNSP for testing segmentation controls.
Why other options are incomplete:A, B, or C alone exclude other viable methods, making D the comprehensive answer.
References:CNSP "Penetration Testing Techniques" (Section on Network Segmentation Bypass) lists DNS tunneling, VLAN hopping, and covert channels as effective methods.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit