02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

390 Chapter 16 ■ Evading IDSs, Firewalls, and Honeypots<br />

7. An attacker can use to find information about a firewall.<br />

A. Banner grabbing<br />

B. Backdoors<br />

C. Packet mapping<br />

D. NNTP<br />

8. A is used to attack an IDS.<br />

A. NULL session<br />

B. DoS<br />

C. Shellcode<br />

D. Port scan<br />

9. Which of the following uses a database of known attacks?<br />

A. Signature file<br />

B. Anomaly<br />

C. Behavior<br />

D. Shellcode<br />

10. An anomaly-based NIDS is designed to look for what?<br />

A. Patterns of known attacks<br />

B. Deviations from known traffic patterns<br />

C. Log alterations<br />

D. False positives<br />

11. Multihomed firewall has a minimum of how many network connections?<br />

A. 2<br />

B. 3<br />

C. 4<br />

D. 5<br />

12. DMZ is created with which of the following?<br />

A. A firewall and a router<br />

B. A multihomed firewall<br />

C. Two routers<br />

D. A multihomed router<br />

13. A firewall is used to separate which of the following?<br />

A. Networks<br />

B. Hosts<br />

C. Permissions<br />

D. ACL

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!