Posted by: Pdfprep
Post Date: November 9, 2020
Which two evasion techniques are used by attackers? (Choose two)
A . Telnet to launch device administrative session
B . Resource exhaustion
C . Port access using Dot1X
D . ACL implementation to drop unwanted traffic
E . Encryption
F . NAT translations on routers and switches
G . URL filtering to block malicious sites
Answer: BE
Leave a Reply