Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam 312-50v12 All Questions

View all questions & answers for the 312-50v12 exam

Exam 312-50v12 topic 1 question 37 discussion

Actual exam question from ECCouncil's 312-50v12
Question #: 37
Topic #: 1
[All 312-50v12 Questions]

Kevin, a professional hacker, wants to penetrate CyberTech Inc’s network. He employed a technique, using which he encoded packets with Unicode characters. The company’s IDS cannot recognize the packets, but the target web server can decode them.
What is the technique used by Kevin to evade the IDS system?

  • A. Session splicing
  • B. Urgency flag
  • C. Obfuscating
  • D. Desynchronization
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
eli117
Highly Voted 1 year, 7 months ago
Selected Answer: C
C. Obfuscating. Explanation: Obfuscation is a technique used by hackers to hide their malicious activities from security systems, such as Intrusion Detection Systems (IDS). In this case, Kevin encoded the packets with Unicode characters to make them difficult for the IDS to recognize and understand. This technique is used to bypass security measures and gain access to a system undetected. However, the target web server can decode the packets, which allows Kevin to gain access to the system. Session splicing, urgency flag, and desynchronization are other techniques used by hackers to evade IDS systems, but they are not applicable in this scenario.
upvoted 10 times
_A_R_D_N_23
7 months, 3 weeks ago
Perfect explanation!
upvoted 1 times
...
rayofhope
10 months, 2 weeks ago
appreciate your answer and explanations
upvoted 2 times
...
...
insaniunt
Most Recent 11 months, 3 weeks ago
Selected Answer: C
C. Obfuscating
upvoted 1 times
...
naija4life
1 year, 5 months ago
Selected Answer: C
C. Obfuscating
upvoted 1 times
...
jeremy13
1 year, 6 months ago
Selected Answer: C
C. Obfuscating CEH Book V12 Module 12 Page 1672 Obfuscating is an IDS evasion technique used by attackers to encode the attack packet payload in such a way that the destination host can only decode the packet but not the IDS. Using Unicode characters, an attacker can encode attack packets that the IDS would not recognize but which an IIS web server can decode.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...