Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSAv10 Topic 5 Question 58 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 58
Topic #: 5
[All ECSAv10 Questions]

In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Hubert
2 days ago
I'm not sure, but I think it might be D) TTL evasion technique.
upvoted 0 times
...
Roslyn
3 days ago
I agree with Billye, IDS evasion technique makes sense.
upvoted 0 times
...
Claudia
3 days ago
Aha! The correct answer must be TTL evasion. I bet the packets are playing hide-and-seek with the IDS by adjusting their time-to-live.
upvoted 0 times
...
Portia
8 days ago
Hmm, IDS evasion, huh? Sounds like a game of cat and mouse between the security system and the sneaky packets.
upvoted 0 times
...
Billye
10 days ago
I think the answer is B) IDS evasion technique.
upvoted 0 times
...
Karrie
11 days ago
I'm not sure, but I think it could also be A) IPS evasion technique, as intrusion prevention systems can also reject packets that bypass the IDS.
upvoted 0 times
...
Clemencia
13 days ago
I agree with Kenny, because TTL evasion technique manipulates the time-to-live field in packets to avoid detection by IDS.
upvoted 0 times
...
Kenny
16 days ago
I think the answer is D) TTL evasion technique.
upvoted 0 times
...

Save Cancel