Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Eccouncil Exam ECSAv10 Topic 5 Question 58 Discussion

Actual exam question for Eccouncil's ECSAv10 exam
Question #: 58
Topic #: 5
[All ECSAv10 Questions]

In which of the following IDS evasion techniques does IDS reject the packets that an end system accepts?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Cherelle
29 days ago
This question is making me hungry. I could go for some IDS-friendly snacks right about now. Maybe some TTL-infused chips?
upvoted 0 times
Tegan
11 hours ago
B) IDS evasion technique
upvoted 0 times
...
Lashawnda
11 days ago
A) IPS evasion technique
upvoted 0 times
...
...
Alline
1 months ago
UDP evasion? More like the packets are doing the moonwalk to avoid detection. I'm feeling confident about the TTL evasion option.
upvoted 0 times
...
Tonja
2 months ago
IPS evasion? Nah, that's just the IPS being a party pooper. I'm going with the IDS evasion technique - the packets are clearly the ninjas here.
upvoted 0 times
Stephania
8 days ago
Definitely, let's go with IDS evasion technique, those packets are like ninjas.
upvoted 0 times
...
Jackie
1 months ago
Yeah, IPS evasion is too strict, IDS evasion is more flexible.
upvoted 0 times
...
Jenelle
1 months ago
IDS evasion technique sounds like the way to go, those packets are sneaky.
upvoted 0 times
...
...
Hubert
2 months ago
I'm not sure, but I think it might be D) TTL evasion technique.
upvoted 0 times
...
Roslyn
2 months ago
I agree with Billye, IDS evasion technique makes sense.
upvoted 0 times
...
Claudia
2 months ago
Aha! The correct answer must be TTL evasion. I bet the packets are playing hide-and-seek with the IDS by adjusting their time-to-live.
upvoted 0 times
Verlene
25 days ago
Yes, the packets try to evade detection by adjusting their time-to-live value.
upvoted 0 times
...
Margarett
1 months ago
I think you're right, TTL evasion technique sounds like the correct answer.
upvoted 0 times
...
...
Portia
2 months ago
Hmm, IDS evasion, huh? Sounds like a game of cat and mouse between the security system and the sneaky packets.
upvoted 0 times
Ettie
18 days ago
D) TTL evasion technique
upvoted 0 times
...
Matilda
22 days ago
C) UDP evasion technique
upvoted 0 times
...
Anastacia
1 months ago
B) IDS evasion technique
upvoted 0 times
...
Alpha
2 months ago
A) IPS evasion technique
upvoted 0 times
...
...
Billye
2 months ago
I think the answer is B) IDS evasion technique.
upvoted 0 times
...
Karrie
2 months ago
I'm not sure, but I think it could also be A) IPS evasion technique, as intrusion prevention systems can also reject packets that bypass the IDS.
upvoted 0 times
...
Clemencia
2 months ago
I agree with Kenny, because TTL evasion technique manipulates the time-to-live field in packets to avoid detection by IDS.
upvoted 0 times
...
Kenny
2 months ago
I think the answer is D) TTL evasion technique.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77