Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.

Unlimited Access

Get Unlimited Contributor Access to the all ExamTopics Exams!
Take advantage of PDF Files for 1000+ Exams along with community discussions and pass IT Certification Exams Easily.

Exam CFR-310 topic 1 question 41 discussion

Actual exam question from CertNexus's CFR-310
Question #: 41
Topic #: 1
[All CFR-310 Questions]

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

  • A. Stealth scanning
  • B. Xmas scanning
  • C. FINS scanning
  • D. Port scanning
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
Wutan
6 months, 2 weeks ago
Selected Answer: B
B. Xmas scanning Xmas scanning is a type of port scanning that sets various TCP flags (URG, PSH, and FIN) to probe a target. By sending packets with these flags set, the hacker can attempt to evade detection by the firewall or IPS. The use of unusual or unexpected TCP flag combinations may confuse or bypass certain security systems.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...