New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil ECSAv10 Exam - Topic 5 Question 58 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 58
Topic #: 5
[All ECSAv10 Questions]

In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Jenelle
3 months ago
I thought it was a UDP evasion technique at first.
upvoted 0 times
...
Dylan
3 months ago
Totally agree, IPS is the right answer!
upvoted 0 times
...
Ashton
4 months ago
Wait, are we sure about that? Sounds off.
upvoted 0 times
...
Julie
4 months ago
I think it's actually an IDS evasion technique.
upvoted 0 times
...
Joni
4 months ago
It's definitely an IPS evasion technique.
upvoted 0 times
...
Elsa
4 months ago
I’m a bit confused about the differences between these techniques. I remember TTL being mentioned, but I can't recall how it fits in with packet acceptance.
upvoted 0 times
...
James
4 months ago
This question seems familiar; I think we had a practice question about packet rejection techniques. I might lean towards option A or B.
upvoted 0 times
...
Leigha
5 months ago
I remember studying IDS evasion techniques, and I feel like option B could be the answer, but I could be mixing it up with something else.
upvoted 0 times
...
Stephen
5 months ago
I think this might be related to how IPS works, but I'm not entirely sure if it's the right choice.
upvoted 0 times
...
Glory
5 months ago
Adding the firewall rule to allow TCP/8443 from the branch to HQ seems like a good step too. I'll make sure to consider that option as well.
upvoted 0 times
...
Cammy
5 months ago
Hmm, I'm a bit confused about the difference between microflows and macroflows. I'll have to think this through carefully.
upvoted 0 times
...
Glory
5 months ago
This seems like a straightforward risk management question. I'll carefully consider the options and go with the one that best addresses the high probability of data loss.
upvoted 0 times
...
Cherelle
9 months ago
This question is making me hungry. I could go for some IDS-friendly snacks right about now. Maybe some TTL-infused chips?
upvoted 0 times
Jules
8 months ago
D) TTL evasion technique
upvoted 0 times
...
Dorinda
8 months ago
C) UDP evasion technique
upvoted 0 times
...
Tegan
8 months ago
B) IDS evasion technique
upvoted 0 times
...
Lashawnda
9 months ago
A) IPS evasion technique
upvoted 0 times
...
...
Alline
10 months ago
UDP evasion? More like the packets are doing the moonwalk to avoid detection. I'm feeling confident about the TTL evasion option.
upvoted 0 times
Lashon
8 months ago
Leonardo: Exactly, it's like the packets are trying to sneak past the IDS.
upvoted 0 times
...
Leonardo
8 months ago
User 2: Yeah, it's all about manipulating the Time To Live field to avoid detection.
upvoted 0 times
...
Jacqueline
8 months ago
User 1: I agree, TTL evasion technique sounds like the way to go.
upvoted 0 times
...
...
Tonja
10 months ago
IPS evasion? Nah, that's just the IPS being a party pooper. I'm going with the IDS evasion technique - the packets are clearly the ninjas here.
upvoted 0 times
Stephania
9 months ago
Definitely, let's go with IDS evasion technique, those packets are like ninjas.
upvoted 0 times
...
Jackie
10 months ago
Yeah, IPS evasion is too strict, IDS evasion is more flexible.
upvoted 0 times
...
Jenelle
10 months ago
IDS evasion technique sounds like the way to go, those packets are sneaky.
upvoted 0 times
...
...
Hubert
10 months ago
I'm not sure, but I think it might be D) TTL evasion technique.
upvoted 0 times
...
Roslyn
10 months ago
I agree with Billye, IDS evasion technique makes sense.
upvoted 0 times
...
Claudia
10 months ago
Aha! The correct answer must be TTL evasion. I bet the packets are playing hide-and-seek with the IDS by adjusting their time-to-live.
upvoted 0 times
Verlene
9 months ago
Yes, the packets try to evade detection by adjusting their time-to-live value.
upvoted 0 times
...
Margarett
10 months ago
I think you're right, TTL evasion technique sounds like the correct answer.
upvoted 0 times
...
...
Portia
11 months ago
Hmm, IDS evasion, huh? Sounds like a game of cat and mouse between the security system and the sneaky packets.
upvoted 0 times
Ettie
9 months ago
D) TTL evasion technique
upvoted 0 times
...
Matilda
9 months ago
C) UDP evasion technique
upvoted 0 times
...
Anastacia
10 months ago
B) IDS evasion technique
upvoted 0 times
...
Alpha
10 months ago
A) IPS evasion technique
upvoted 0 times
...
...
Billye
11 months ago
I think the answer is B) IDS evasion technique.
upvoted 0 times
...
Karrie
11 months ago
I'm not sure, but I think it could also be A) IPS evasion technique, as intrusion prevention systems can also reject packets that bypass the IDS.
upvoted 0 times
...
Clemencia
11 months ago
I agree with Kenny, because TTL evasion technique manipulates the time-to-live field in packets to avoid detection by IDS.
upvoted 0 times
...
Kenny
11 months ago
I think the answer is D) TTL evasion technique.
upvoted 0 times
...

Save Cancel