176.
Firewalking is done to accomplish which of the following?
- A.Find the configuration of an NIDS.
- B.Find the configuration of an HIDS.
- C.Uncover a honeypot.
- D.Analyze a firewall.
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Firewalking can be used to analyze the configuration and rules on a firewall. |
177.
A method for overwhelming an IDS using packets with incorrect TTL values or flags is
known as what?
- A.Session splicing
- B.Insertion
- C.Fragmenting
- D.ACK scanning
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
An insertion attack is one where packets that would be dropped by an end system are accepted by the IDS. Because the IDS accepts packets, it results in a denial of service with some IDSs. |
178.
How does a fragmentation attack, which takes a packet, breaks it into fragments, and
sends only some of the fragments to the target, cause a DoS?
- A.By consuming processor power on the IDS
- B.By overwhelming the IDS with too many fragments
- C.By exhausting memory by caching the fragments
- D.By filling virtual memory with too much data
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
When a packet is fragmented and directed at an IDS, but only part of the fragments are sent or received, the fragments will continue to consume memory on some IDSs. The reason is that a less-capable or less-intelligent IDS will hold onto the fragments while they wait for the remainder, thus consuming memory. |
179.
Which of the following uses a database of known attacks?
- A.Signature file
- B.Anomaly
- C.Behavior
- D.Shellcode
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Signature files are used by IDSs to match traffic against known attacks to determine if an attack has been found or if normal traffic is present. |
180.
An anomaly-based NIDS is designed to look for what?
- A.Patterns of known attacks
- B.Deviations from known traffic patterns
- C.Log alterations
- D.False positives
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
An anomaly-based NIDS is designed to look for deviations from known traffic patterns and behaviors on the network. Such NIDSs need to be tuned to the network they are connected to. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40