Skip to content

Certified Ethical Hacker v11 312-50v11

  • Certified Ethical Hacker v11 312-50v11

Tag: Question 199

Certified Ethical Hacker v11 312-50v11 – Question199

Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls.
On which of the following ports should Robin run the NSTX tool?

A.
Port 50
B. Port 23
C. Port 53
D. Port 80

Correct Answer: C

Tagged Certified Ethical Hacker v11 312-50v11, Question 199
Download all the questions as a printable PDF file from here
Exam Practice Tests

Please disable your adblocker or whitelist this site!