ETHER: Destination address : 0000BA5EBA11 ETHER: Source address :

An employee wants to defeat detection by a network-based IDS application. He does not want to attack the system containing the IDS application. Which of the following strategies can be used to defeat detection by a network-based IDS application?
Certain types of encryption presents challenges to network-based intrusion detection and may leave the IDS blind to certain attacks, where a host-based IDS analyzes the data after it has been decrypted.
Whitney
4 months agoAlise
4 months agoShawnna
4 months agoAlton
4 months agoEvelynn
5 months agoLeota
5 months agoShantay
5 months agoCammy
5 months agoJulene
5 months agoAntonio
5 months agoSkye
5 months agoElroy
5 months agoXochitl
5 months ago