Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

The SecOps Group Exam CNSP Topic 15 Question 9 Discussion

Actual exam question for The SecOps Group's CNSP exam
Question #: 9
Topic #: 15
[All CNSP Questions]

Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?

Show Suggested Answer Hide Answer
Suggested Answer: D

Network segmentation isolates network zones for security, but certain techniques can circumvent these controls, a focus of CNSP penetration testing.

Why D is correct:

A: DNS tunneling encodes data in DNS queries, bypassing segmentation via legitimate DNS traffic.

B: VLAN hopping exploits switch misconfigurations (e.g., double tagging) to access other VLANs.

C: Covert channels use hidden communication paths (e.g., timing channels) to evade segmentation.

All are valid techniques per CNSP for testing segmentation controls.

Why other options are incomplete: A, B, or C alone exclude other viable methods, making D the comprehensive answer.


Contribute your Thoughts:

Francis
5 days ago
DNS tunneling? Sounds like a fun way to play hide-and-seek with the network admins. I'm in!
upvoted 0 times
...
Cathrine
9 days ago
Covert channels, definitely. That's the sneakiest way to bypass those pesky network segmentations.
upvoted 0 times
...
Graciela
9 days ago
But wouldn't C) Covert channels also be a valid technique to bypass network segmentation?
upvoted 0 times
...
Allene
11 days ago
I disagree, I believe the answer is B) VLAN hopping.
upvoted 0 times
...
Ayesha
13 days ago
Hmm, I think all of those techniques could work. It really depends on the specific network setup.
upvoted 0 times
Ryan
2 days ago
A) DNS tunneling
upvoted 0 times
...
...
Graciela
19 days ago
I think the answer is A) DNS tunneling.
upvoted 0 times
...
Adelaide
1 months ago
VLAN hopping, that's the one! I learned about that in my last penetration testing course.
upvoted 0 times
Florinda
3 days ago
It's important for network administrators to be aware of these vulnerabilities.
upvoted 0 times
...
Marla
4 days ago
I heard that attackers can use VLAN hopping to intercept sensitive data.
upvoted 0 times
...
Denny
5 days ago
Yes, it's a clever technique to gain unauthorized access to different VLANs.
upvoted 0 times
...
Leslee
22 days ago
VLAN hopping can be quite effective in bypassing network segmentation.
upvoted 0 times
...
...

Save Cancel