Which two evasion techniques are used by attackers? (Choose two)

Posted by: Pdfprep Category: 400-251 Tags: , ,

Which two evasion techniques are used by attackers? (Choose two)
A . Telnet to launch device administrative session
B . Resource exhaustion
C . Port access using Dot1X
D . ACL implementation to drop unwanted traffic
E . Encryption
F . NAT translations on routers and switches
G . URL filtering to block malicious sites

Answer: BE



Leave a Reply

Your email address will not be published.