tutorialpoint.org

Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    1. You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).

    What is the best way to evade the NIDS?

    A. Out of band signalling

    B. Protocol Isolation

    C. Alternate Data Streams

    D. Encryption



    2. You have several plain-text firewall logs that you must review to evaluate network traffic. You know that in order to do fast, efficent searches of the logs you roust use regular expressions.

    Which command-line utility are you most likely to use?

    A. Relational Database

    B. Grep

    C. Notepad

    D. MS Excel



    < Prev.Page             CEHv9 Home             Next page>