Which of the following strategies can be used to defeat detection by a network-based IDS application?

Posted by: Pdfprep Category: CEH-001 Tags: , ,

ETHER: Destination address: 0000BA5EBA11 ETHER: Source address :

An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application.

Which of the following strategies can be used to defeat detection by a network-based IDS application?
A . Create a SYN flood
B . Create a network tunnel
C . Create multiple false positives
D . Create a ping flood

Answer: B

Explanation:

Certain types of encryption presents challenges to network-based intrusion detection and may leave the IDS blind to certain attacks, where a host-based IDS analyzes the data after it has been decrypted.

Leave a Reply

Your email address will not be published.