Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?
Network segmentation isolates network zones for security, but certain techniques can circumvent these controls, a focus of CNSP penetration testing.
Why D is correct:
A: DNS tunneling encodes data in DNS queries, bypassing segmentation via legitimate DNS traffic.
B: VLAN hopping exploits switch misconfigurations (e.g., double tagging) to access other VLANs.
C: Covert channels use hidden communication paths (e.g., timing channels) to evade segmentation.
All are valid techniques per CNSP for testing segmentation controls.
Why other options are incomplete: A, B, or C alone exclude other viable methods, making D the comprehensive answer.
Garry
1 months agoChaya
23 hours agoAlecia
2 months agoLaurena
20 days agoJaney
1 months agoAntonio
2 months agoKris
2 months agoCecilia
2 months agoBoris
2 months agoShaunna
Shay
1 days agoJin
22 days agoMiesha
24 days agoNohemi
25 days agoEdward
28 days agoAntonio
2 months ago