Which of the following techniques can be used to bypass network segmentation during infrastructure penetration testing?
Network segmentation isolates network zones for security, but certain techniques can circumvent these controls, a focus of CNSP penetration testing.
Why D is correct:
A: DNS tunneling encodes data in DNS queries, bypassing segmentation via legitimate DNS traffic.
B: VLAN hopping exploits switch misconfigurations (e.g., double tagging) to access other VLANs.
C: Covert channels use hidden communication paths (e.g., timing channels) to evade segmentation.
All are valid techniques per CNSP for testing segmentation controls.
Why other options are incomplete: A, B, or C alone exclude other viable methods, making D the comprehensive answer.
Ruby
12 hours agoAgustin
6 days agoLynelle
11 days agoJarod
16 days agoTarra
21 days agoLeila
26 days agoRonna
1 month agoKristeen
1 month agoSherell
1 month agoCasandra
2 months agoLorean
2 months agoKathrine
2 months agoMarilynn
2 months agoWillard
2 months agoIvette
3 months agoCandra
3 months agoLonna
3 months agoCecil
2 months agoMarilynn
3 months ago