PrepAway - Latest Free Exam Questions & Answers

Which of the following strategies can be used to defeat detection by a network-based IDS application?

An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application.

Which of the following strategies can be used to defeat detection by a network-based IDS application? (Choose the best answer)

PrepAway - Latest Free Exam Questions & Answers

A.
Create a network tunnel.

B.
Create a multiple false positives.

C.
Create a SYN flood.

D.
Create a ping flood.

Explanation:
Certain types of encryption presents challenges to network-based intrusion detection and may leave the IDS blind to certain attacks, where a host-based IDS analyzes the data after it has been decrypted.


Leave a Reply