81.
An HIDS is used to monitor activity on which of the following?
- A.Network
- B.Application
- C.Log file
- D.Host
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
An HIDS (host-based intrusion detection system) is used to monitor security violations on a particular host. |
82.
Which of the following can be used to identify a firewall?
- A.Search engines
- B.Email
- C.Port scanning
- D.Google hacking
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Port scanning can be used to identify certain firewalls because specific ports are known to be open and available on some firewalls. |
83.
An NIDS is based on technology similar to which of the following?
- A.Packet sniffing
- B.Privilege escalation
- C.Enumeration
- D.Backdoor
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
An NIDS includes extra features not found in programs such as Wireshark, but at its core it functions in a similar way to a packet sniffer. |
84.
Which of the following can be used to evade an IDS?
- A.Packet sniffing
- B.Port scanning
- C.Enumeration
- D.Encryption
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Encryption can be used to avoid specific types of firewalls because of their inability to decrypt the traffic. |
85.
Altering a checksum of a packet can be used to do what?
- A.Send an RST.
- B.Send a URG.
- C.Reset a connection.
- D.Evade an NIDS.
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
You can evade an NIDS by altering a checksum because some systems cannot handle the differences in checksums on a packet when encountered. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40