Attackers circumvent IDSs by implementing techniques such as:
A. Packet fragmentation
B. UDP port scans
C. NAT translation
D. TCP scans
Answer: A. Packet fragmentation
You might also like to view...
Compare and contrast block cipher with stream cipher.
What will be an ideal response?
A motivated computer user buys a new motherboard for his computer. After taking a hardware repair course through the local college, he disassembles his old computer, replaces the old motherboard, and reassembles his computer. He discovers there is only one mini-DIN connector on the motherboard and it is designated for the keyboard. What should he do?
A) Return the motherboard for a full refund and reinstall the old motherboard. B) Insert the keyboard into the serial port. C) Install a DIN-to-USB converter on the mouse and use a USB port. D) Buy a new keyboard.
Which of these is the most secure protocol for transferring files?
a. FTPS b. SFTP c. TCP d. FTP
An intrusion has occurred in an internet facing system. The security administrator would like to gather forensic evidence while the system is still in operation. Which of the following procedures should the administrator perform FIRST on the system?
A. Make a drive image B. Take hashes of system data C. Collect information in RAM D. Capture network traffic