Evading IDS, Firewalls and Honeypots
SKILLSET
To engage in malicious activity against networking and computing systems while being undetected by networking security hardware.
Related Questions
- Using a network analyzer you may be able to determine excessive amounts of multicast broadcast. This would indicate what?
- A circuit level gateway (firewall) works at which of the following layers of the OSI Model?
- True or False: A Web Application Firewall prevents users from accessing known websites that host illegal applications.
- Snort is an open source IDS. However it can be used for other purposes, Which is the other features?
- What is a system device that performs an attack recognition and alerting for a network?
- Which of the following could be used as countermeasures for maintenance hooks? (select two)
- In what ways is an IDS able to detect intrusion attempts?
- If network utilization exceeds the IDS sensor traffic rating, an acceptable solution is to use additional sensors at key points along the traffic path to allow for the capture of the entire traffic flow in aggregate. True or false?
- Which countermeasure for a denial of service attack would include filtering out external packets that appear to come from an internal address?
- A(n) ____ type of IDS is useful against known threats but is not generally effective against zero day attacks.