Certified Ethical Hacker (CEHv9) Questions and answers
55. You have compromised a server and successfully gained a root access. You want M pivot and pass traffic undetected over
the network and evade any possible Intrusion Detection System. What is the best approach?
A. Install Cryptcat and encrypt outgoing packets from this server.
B. Use HTTP so that all traffic can be routed via a browser, thus evading the internal Intrusion Detection Systems.
C. Use Alternate Data Streams to hide the outgoing packets from this server.
D. Install and use Telnet to encrypt all outgoing traffic from this server.
56. It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection.
Which of the following terms best matches the definition?