Which of the following strategies can be used to defeat detection by a network-based IDS application?

ETHER: Destination address : 0000BA5EBA11 ETHER: Source address :

An employee wants to defeat detection by a network-based IDS application. He does not want to
attack the system containing the IDS application. Which of the following strategies can be used to
defeat detection by a network-based IDS application?

ETHER: Destination address : 0000BA5EBA11 ETHER: Source address :

An employee wants to defeat detection by a network-based IDS application. He does not want to
attack the system containing the IDS application. Which of the following strategies can be used to
defeat detection by a network-based IDS application?

A.
Create a SYN flood

B.
Create a network tunnel

C.
Create multiple false positives

D.
Create a ping flood

Explanation:
Certain types of encryption presents challenges to network-based intrusion
detection and may leave the IDS blind to certain attacks,where a host-based IDS analyzes the
data after it has been decrypted.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Loki

Loki

D. is the correct answer! (Create a ping flood)