An employee wants to defeat detection by a network-based IDS application. He does not want to
attack the system containing the IDS application.
Which of the following strategies can be used to defeat detection by a network-based IDS
application? (Choose the best answer)
A.
Create a network tunnel.
B.
Create a multiple false positives.
C.
Create a SYN flood.
D.
Create a ping flood.
Explanation:
Certain types of encryption presents challenges to network-based intrusion
detection and may leave the IDS blind to certain attacks,where a host-based IDS analyzes the
data after it has been decrypted.