Posted by: Pdfprep
Post Date: March 12, 2021
An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application.
Which of the following strategies can be used to defeat detection by a network-based IDS application? (Choose the best answer)
A . Create a network tunnel.
B . Create a multiple false positives.
C . Create a SYN flood.
D . Create a ping flood.
Answer: A
Explanation:
Certain types of encryption presents challenges to network-based intrusion detection and may leave the IDS blind to certain attacks, where a host-based IDS analyzes the data after it has been decrypted.
Leave a Reply