Which technique uses network tunneling to hide traffic and evade detection?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which technique uses network tunneling to hide traffic and evade detection?

Explanation:
Hiding traffic in transit with network tunneling is a network-level technique to cover tracks on the network. By encapsulating or encrypting data inside another channel (like an SSH tunnel or a VPN), the actual payload looks like normal traffic to many network sensors, helping the activity evade detection by IDS/IPS and other monitors. This focuses on concealing what’s moving across the network rather than what happens on the host itself. Clearing logs or deleting files deal with evidence on the machine, and OS-level cover tracks target traces on the system, not the traffic in transit. That makes network tunneling the clearest example of covering tracks on the network.

Hiding traffic in transit with network tunneling is a network-level technique to cover tracks on the network. By encapsulating or encrypting data inside another channel (like an SSH tunnel or a VPN), the actual payload looks like normal traffic to many network sensors, helping the activity evade detection by IDS/IPS and other monitors. This focuses on concealing what’s moving across the network rather than what happens on the host itself. Clearing logs or deleting files deal with evidence on the machine, and OS-level cover tracks target traces on the system, not the traffic in transit. That makes network tunneling the clearest example of covering tracks on the network.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy