Home
You may like this!
176.
Firewalking is done to accomplish which of the following?
  • A.
    Find the configuration of an NIDS.
  • B.
    Find the configuration of an HIDS.
  • C.
    Uncover a honeypot.
  • D.
    Analyze a firewall.
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Firewalking can be used to analyze the configuration and rules on a firewall.
Report
Name Email  
177.
A method for overwhelming an IDS using packets with incorrect TTL values or flags is known as what?
  • A.
    Session splicing
  • B.
    Insertion
  • C.
    Fragmenting
  • D.
    ACK scanning
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
An insertion attack is one where packets that would be dropped by an end system are accepted by the IDS. Because the IDS accepts packets, it results in a denial of service with some IDSs.
Report
Name Email  
178.
How does a fragmentation attack, which takes a packet, breaks it into fragments, and sends only some of the fragments to the target, cause a DoS?
  • A.
    By consuming processor power on the IDS
  • B.
    By overwhelming the IDS with too many fragments
  • C.
    By exhausting memory by caching the fragments
  • D.
    By filling virtual memory with too much data
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
When a packet is fragmented and directed at an IDS, but only part of the fragments are sent or received, the fragments will continue to consume memory on some IDSs. The reason is that a less-capable or less-intelligent IDS will hold onto the fragments while they wait for the remainder, thus consuming memory.
Report
Name Email  
179.
Which of the following uses a database of known attacks?
  • A.
    Signature file
  • B.
    Anomaly
  • C.
    Behavior
  • D.
    Shellcode
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Signature files are used by IDSs to match traffic against known attacks to determine if an attack has been found or if normal traffic is present.
Report
Name Email  
180.
An anomaly-based NIDS is designed to look for what?
  • A.
    Patterns of known attacks
  • B.
    Deviations from known traffic patterns
  • C.
    Log alterations
  • D.
    False positives
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
An anomaly-based NIDS is designed to look for deviations from known traffic patterns and behaviors on the network. Such NIDSs need to be tuned to the network they are connected to.
Report
Name Email