Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Which of these IDS evasion techniques is most likely to be deployed by an attacker?
Denial of service
Obfuscation
Fragmentation
Encryption
Of all the given techniques, the most likely to be deployed is obfuscation. For a signature-based IDS, the attack pattern may be obfuscated such that such an IDS cannot recognize the attack. This is stealthier than techniques like denial of service.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.