Covering tracks on the network might involve techniques such as reverse HTTP shells, reverse ICMP tunnels, DNS tunneling, and TCP parameters. Which term describes this action?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Covering tracks on the network might involve techniques such as reverse HTTP shells, reverse ICMP tunnels, DNS tunneling, and TCP parameters. Which term describes this action?

Explanation:
Hiding or evading detection of network activity through covert channels is the key idea here. Techniques like reverse HTTP shells, reverse ICMP tunnels, DNS tunneling, and tweaking TCP parameters are all about carrying commands or data and avoiding network monitoring, so the action described is covering tracks on the network. The other options focus on evidence cleanup on the host itself—deleting files or clearing OS event logs—which is OS-level rather than network-level concealment. So the best match is covering tracks on the network.

Hiding or evading detection of network activity through covert channels is the key idea here. Techniques like reverse HTTP shells, reverse ICMP tunnels, DNS tunneling, and tweaking TCP parameters are all about carrying commands or data and avoiding network monitoring, so the action described is covering tracks on the network. The other options focus on evidence cleanup on the host itself—deleting files or clearing OS event logs—which is OS-level rather than network-level concealment. So the best match is covering tracks on the network.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy