{"id":340,"date":"2022-02-25T19:43:54","date_gmt":"2022-02-25T19:37:28","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question199\/"},"modified":"2022-02-25T19:46:26","modified_gmt":"2022-02-25T19:46:26","slug":"certified-ethical-hacker-v11-312-50v11-question199","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question199\/","title":{"rendered":"Certified Ethical Hacker v11 312-50v11 &#8211; Question199"},"content":{"rendered":"<div class=\"question\">Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls.<br \/>\nOn which of the following ports should Robin run the NSTX tool?<br \/><strong><br \/>A.<\/strong> Port 50<br \/><strong>B.<\/strong> Port 23<br \/><strong>C.<\/strong> Port 53<br \/><strong>D.<\/strong> Port 80<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Robin, an attacker, is attempting to bypass the firewalls of an organization through the DNS tunneling method in order to exfiltrate data. He is using the NSTX tool for bypassing the firewalls. On which of the following ports should Robin run the NSTX tool?A. Port 50B. Port 23C. Port 53D. Port 80 Show Answer Hide [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,202],"class_list":["post-340","post","type-post","status-publish","format-standard","hentry","category-certified-ethical-hacker-v11-312-50v11","tag-certified-ethical-hacker-v11-312-50v11","tag-question-199"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/comments?post=340"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/340\/revisions"}],"predecessor-version":[{"id":567,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/340\/revisions\/567"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/media?parent=340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/categories?post=340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/tags?post=340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}