CEH

(Jeff_L) #1

390 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots



  1. An attacker can use to find information about a firewall.
    A. Banner grabbing
    B. Backdoors
    C. Packet mapping
    D. NNTP

  2. A is used to attack an IDS.
    A. NULL session
    B. DoS
    C. Shellcode
    D. Port scan

  3. Which of the following uses a database of known attacks?
    A. Signature file
    B. Anomaly
    C. Behavior
    D. Shellcode

  4. An anomaly-based NIDS is designed to look for what?
    A. Patterns of known attacks
    B. Deviations from known traffic patterns
    C. Log alterations
    D. False positives

  5. Multihomed firewall has a minimum of how many network connections?
    A. 2
    B. 3
    C. 4
    D. 5

  6. DMZ is created with which of the following?
    A. A firewall and a router
    B. A multihomed firewall
    C. Two rout e r s
    D. A multihomed router

  7. A firewall is used to separate which of the following?
    A. Networks
    B. Hosts
    C. Permissions
    D. ACL

Free download pdf