Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CFR-310 All Questions

View all questions & answers for the CFR-310 exam

Exam CFR-310 topic 1 question 41 discussion

Actual exam question from CertNexus's CFR-310
Question #: 41
Topic #: 1
[All CFR-310 Questions]

After successfully enumerating the target, the hacker determines that the victim is using a firewall. Which of the following techniques would allow the hacker to bypass the intrusion prevention system (IPS)?

  • A. Stealth scanning
  • B. Xmas scanning
  • C. FINS scanning
  • D. Port scanning
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
044f354
1 month, 3 weeks ago
Selected Answer: A
A. Stealth scanning Explanation: Stealth scanning is a technique used to avoid detection by firewalls and Intrusion Prevention Systems (IPS). It works by sending packets in a way that makes it difficult for the firewall or IPS to detect and log the activity, such as using fragmented packets or SYN scans (half-open scanning), which minimizes the interaction with the target system. Why the other answers are less suitable: B. Xmas scanning: Sends packets with the FIN, PSH, and URG flags set, but it's noisy and easily detectable by most firewalls and IPS systems. It can raise alarms rather than evade them. C. FIN scanning: Sends packets with the FIN flag set, which is less noisy than Xmas scanning but still detectable by modern intrusion detection systems. D. Port scanning: While useful for enumerating open ports, typical port scanning is easily detected by firewalls and IPS, especially if the scans are frequent or comprehensive.
upvoted 1 times
...
Wutan
1 year, 1 month ago
Selected Answer: B
B. Xmas scanning Xmas scanning is a type of port scanning that sets various TCP flags (URG, PSH, and FIN) to probe a target. By sending packets with these flags set, the hacker can attempt to evade detection by the firewall or IPS. The use of unusual or unexpected TCP flag combinations may confuse or bypass certain security systems.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...