Which of the following strategies can the employee use to evade detection by the network based IDS application
An Employee wants to bypass detection by a network-based IDS application and does not want to attack the system containing the IDS application. Which of the following strategies can the employee use to evade detection by the network based IDS application?
What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detect
What is the advantage in encrypting the communication between the agent and the monitor in an Intrusion Detection System?
What is the purpose of firewalking?
What is the purpose of firewalking?
What tool might he use to bypass the IDS?
An Evil Cracker is attempting to penetrate your private network security. To do this, he must not be seen by your IDS, as it may take action to stop him. What tool might he use to bypass the IDS?
Select the best answer.
Which of these describes a low interaction honeypot?
There are two types of honeypots- high and low interaction. Which of these describes a low interaction honeypot?
Select the best answers.
Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing att
Which of the following countermeasure can specifically protect against both the MAC Flood and MAC Spoofing attacks?
A program that defends against a port scanner will attempt to:
A program that defends against a port scanner will attempt to:
which of the following options is he likely to choose?
John has a proxy server on his network which caches and filters web access. He shuts down all unnecessary ports and services. Additionally, he has installed a firewall (Cisco PIX) that will not allow users to connect to any outbound ports. Jack, a network user has successfully connected to a remote server on port 80 using netcat. He could in turn drop a shell from the remote machine. Assuming an attacker wants to penetrate John’s network, which of the following options is he likely to choose?
How can you achieve this?
You are the security administrator for a large network. You want to prevent attackers from running any sort of traceroute into your DMZ and discovering the internal structure of publicly accessible areas of the network. How can you achieve this?
What would be your inference?
Eric notices repeated probes to port 1080. He learns that the protocol being used is designed to allow a host outside of a firewall to connect transparently and securely through the firewall. He wonders if his firewall has been breached. What would be your inference?