What are two evasion techniques that are used by hackers? (Choose two.)

What are two evasion techniques that are used by hackers? (Choose two.)

  • phishing
  • Trojan horse
  • reconnaissance
  • rootkit
  • pivot
    Answers Explanation & Hints:

    The following methods are used by hackers to avoid detection:Encryption and tunneling – hide or scramble the malware content
    Resource exhaustion – keeps the host device too busy to detect the invasion
    Traffic fragmentation – splits the malware into multiple packets
    Protocol-level misinterpretation – sneaks by the firewall
    Pivot – uses a compromised network device to attempt access to another device
    Rootkit – allows the hacker to be undetected and hides software installed by the hacker