exam questions

Exam ECSAv10 All Questions

View all questions & answers for the ECSAv10 exam

Exam ECSAv10 topic 1 question 35 discussion

Actual exam question from ECCouncil's ECSAv10
Question #: 35
Topic #: 1
[All ECSAv10 Questions]

The Rhythm Networks Pvt Ltd firm is a group of ethical hackers. Rhythm Networks was asked by their client Zombie to identify how the attacker penetrated their firewall. Rhythm discovered the attacker modified the addressing information of the IP packet header and the source address bits field to bypass the firewall.
What type of firewall bypassing technique was used by the attacker?

  • A. Source routing
  • B. Proxy Server
  • C. HTTP Tunneling
  • D. Anonymous Website Surfing Sites
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
ccie_cbap
3 years, 7 months ago
Selected Answer: A
techinque used is routing not HTTP tunnel
upvoted 1 times
...
Steven_asl
4 years ago
Correct answer is A source routing see module 7 pg 291
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...