PrepAway - Latest Free Exam Questions & Answers

What is this masking technique called?

The terrorist organizations are increasingly blocking all traffic from North America or from Internet Protocol addresses that point back to users who rely on the English language.
Hackers sometimes set a number of criteria for accessing their website. This information is shared among the co-hackers. For example if you are using a machine with the Linux operating system and the Netscape browser then you will have access to their website in a covert way. When federal investigators using PCs running Windows and using Internet Explorer visited the hackers’ shared site, the hackers’ system immediately mounted a distributed denial-of-service attack against the federal system.
Companies today are engaging in tracking competitors’ through reverse IP address lookup sites like whois.com, which provide an IP address’s domain. When the competitor visits the companies website they are directed to a products page without discount and prices are marked higher for their product. When normal users visit the website they are directed to a page with full-blown product details along with attractive discounts. This is based on IP-based blocking, where certain addresses are barred from accessing a site.
What is this masking technique called?

PrepAway - Latest Free Exam Questions & Answers

A.
Website Filtering

B.
IP Access Blockade

C.
Mirroring Website

D.
Website Cloaking

Explanation:
Website Cloaking travels under a variety of alias including Stealth, Stealth scripts, IP delivery, Food Script, and Phantom page technology. It’s hot- due to its ability to manipulate those elusive top-ranking results from spider search engines.


Leave a Reply