exam questions

Exam ECSAv10 All Questions

View all questions & answers for the ECSAv10 exam

Exam ECSAv10 topic 1 question 28 discussion

Actual exam question from ECCouncil's ECSAv10
Question #: 28
Topic #: 1
[All ECSAv10 Questions]

Peter works as a lead penetration tester in a security service firm named Xsecurity. Recently, Peter was assigned a white-box pen test assignment testing the security of an IDS system deployed by a client. During the preliminary information gathering, Peter discovered the TTL to reach the IDS system from his end is 30.
Peter created a Trojan and fragmented it in to 1-character packets using the Colasoft packet builder tool. He then used a packet flooding utility to bombard the IDS with these fragmented packets with the destination address of a target host behind the IDS whose TTL is 35.
What is Peter trying to achieve?

  • A. Peter is trying to bypass the IDS system using a Trojan
  • B. Peter is trying to bypass the IDS system using the broadcast address
  • C. Peter is trying to bypass the IDS system using the insertion attack
  • D. Peter is trying to bypass the IDS system using inconsistent packets
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Currently there are no comments in this discussion, be the first to comment!
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago