Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
exam questions

Exam CISSP All Questions

View all questions & answers for the CISSP exam

Exam CISSP topic 1 question 479 discussion

Actual exam question from ISC's CISSP
Question #: 479
Topic #: 1
[All CISSP Questions]

Which of the following BEST describes an example of evading intrusion detection system (IDS) signature detection?

  • A. Packet fragmentation
  • B. SQL injection (SQLi)
  • C. Cross-Site Scripting (XSS)
  • D. Encoding
Show Suggested Answer Hide Answer
Suggested Answer: A 🗳️

Comments

Chosen Answer:
This is a voting comment (?) , you can switch to a simple comment.
Switch to a voting comment New
user009
Highly Voted 1 year, 9 months ago
An example of evading intrusion detection system (IDS) signature detection is packet fragmentation (Option A). Packet fragmentation is a technique used by attackers to split a large data packet into smaller pieces before sending them to the target system. This can allow the attacker to bypass signature-based IDS detection, as the signature may be distributed across multiple packets or may not be recognizable in the smaller fragments. The attacker can then reassemble the fragmented packets on the target system and execute the attack without triggering the IDS signature.
upvoted 7 times
jackdryan
1 year, 6 months ago
A is correct
upvoted 1 times
...
...
deeden
Most Recent 3 months, 1 week ago
Selected Answer: A
Agree with A. This technique involves breaking down a malicious payload into smaller packets that are transmitted separately. IDS systems that inspect packet contents often do so by reassembling the packets before analyzing them. If the fragmentation is done in such a way that the IDS either fails to reassemble the packets correctly or overlooks the malicious content, the attack can evade detection. This is a common method for evading IDS signature-based detection, as it can obscure the malicious payload from the system.
upvoted 1 times
...
Soleandheel
11 months, 1 week ago
A. Packet fragmentation Packet fragmentation is a technique used to evade intrusion detection system (IDS) signature detection. In this method, an attacker splits an attack payload into smaller packets, taking advantage of the fact that many IDS systems may only inspect the initial fragment of a packet. By doing so, the attacker can try to avoid detection by spreading the attack payload across multiple packets, making it more difficult for the IDS to detect the malicious content. This technique is often used to bypass signature-based detection mechanisms.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...