exam questions

Exam 312-50v11 All Questions

View all questions & answers for the 312-50v11 exam

Exam 312-50v11 topic 1 question 19 discussion

Actual exam question from ECCouncil's 312-50v11
Question #: 19
Topic #: 1
[All 312-50v11 Questions]

Which of the following is an extremely common IDS evasion technique in the web world?

  • A. Spyware
  • B. Subnetting
  • C. Unicode Characters
  • D. Port Knocking
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
study_Somuch
Highly Voted 1 year, 8 months ago
C : Using Unicode representation, where each character has a unique value regardless of the platform, program, or language, is also an effective way to evade IDSs. For example, an attacker might evade an IDS by using the Unicode character c1 to represent a slash for a Web page request.
upvoted 8 times
...
Daniel8660
Most Recent 6 months, 2 weeks ago
Selected Answer: C
IDS Evasion Techniques Unicode Evasion Technique Unicode is a character coding system to support the worldwide interchange, processing, and display of written texts.
 Taking this as an advantage, attackers can convert attack strings to Unicode characters to avoid pattern and signature matching at the IDS. (P.1551/1535)
upvoted 4 times
...
Mara03
10 months, 3 weeks ago
It says "web world" so its clearly C
upvoted 1 times
...
study_Somuch
1 year, 8 months ago
The primary purpose of port knocking is to prevent an attacker from scanning a system for potentially exploitable services by doing a port scan, because unless the attacker sends the correct knock sequence, the protected ports will appear closed.
upvoted 2 times
Re_My
1 year, 5 months ago
Port Nocking works only for Enumeration (Reconnaissance) not for evasion.
upvoted 1 times
...
...
sam422
2 years, 1 month ago
Answer C, Unicode is a character coding system that supports encoding, processing, and displaying of written texts for universal languages to maintain consistency in a computer representation. Several standards, such as Java, LDAP, and XML, require Unicode, and many OS and applications support it. Attackers can implement an attack by different character encodings known as “code points” in the Unicode code space. The most commonly used character encodings are Unicode Transformation Format (UTF)-8 and UTF-16.
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago