CEH

(Jeff_L) #1

Review Questions 389


Review Questions



  1. An HIDS is used to monitor activity on which of the following?


A. Network
B. Application
C. Log file
D. Host


  1. Which of the following can be used to identify a firewall?


A. Search engines
B. E-mail
C. Port scanning
D. Google hacking


  1. An NIDS is based on technology similar to which of the following:


A. Packet sniffing
B. Privilege escalation
C. Enumeration
D. Backdoor


  1. Which of the following can be used to evade an IDS?


A. Packet sniffing
B. Port scanning
C. Enumeration
D. Encryption


  1. Altering a checksum of a packet can be used to do what?


A. Send an RST
B. Send a URG
C. Reset a connection
D. Evade an NIDS


  1. Firewalking is done to accomplish which of the following?


A. Find the configuration of an NIDS
B. Find the configuration of an HIDS
C. Uncover a honeypot
D. Analyze a firewall
Free download pdf