Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of following methods could a hacker use to evade an intrusion detection system? (choose three)
MAC Flood
Code Obfuscation
TCP Connect Scans
Packet Fragmentation
Firewalking
Denial of Service
An IDS cannot determine the nature of an attack if the message is correctly fragmented. Obfuscating code will prevent it from matching signatures the IDS is based on. While not commonly thought of, the attacker can use a DoS attack against an IDS by flooding it with false positives to overload the system, which could potentially allow in malicious traffic. -- Firewalking is used to determine what ports of a firewall are open. MAC Floods are used to overload a switch to sniff a switched network. TCP Connect Scans perform full three-way handshakes and are often logged as connections (or will be discovered by an IDS).
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.