Home
You may like this!
81.
An HIDS is used to monitor activity on which of the following?
  • A.
    Network
  • B.
    Application
  • C.
    Log file
  • D.
    Host
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
An HIDS (host-based intrusion detection system) is used to monitor security violations on a particular host.
Report
Name Email  
82.
Which of the following can be used to identify a firewall?
  • A.
    Search engines
  • B.
    Email
  • C.
    Port scanning
  • D.
    Google hacking
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
Port scanning can be used to identify certain firewalls because specific ports are known to be open and available on some firewalls.
Report
Name Email  
83.
An NIDS is based on technology similar to which of the following?
  • A.
    Packet sniffing
  • B.
    Privilege escalation
  • C.
    Enumeration
  • D.
    Backdoor
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
An NIDS includes extra features not found in programs such as Wireshark, but at its core it functions in a similar way to a packet sniffer.
Report
Name Email  
84.
Which of the following can be used to evade an IDS?
  • A.
    Packet sniffing
  • B.
    Port scanning
  • C.
    Enumeration
  • D.
    Encryption
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Encryption can be used to avoid specific types of firewalls because of their inability to decrypt the traffic.
Report
Name Email  
85.
Altering a checksum of a packet can be used to do what?
  • A.
    Send an RST.
  • B.
    Send a URG.
  • C.
    Reset a connection.
  • D.
    Evade an NIDS.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
You can evade an NIDS by altering a checksum because some systems cannot handle the differences in checksums on a packet when encountered.
Report
Name Email