Certified Ethical Hacker (CEHv9) Questions and answers
1. You have successfully gained access to a linux server and would like to ensure that the succeeding outgoing
traffic from this server will not be caught by a Network Based Intrusion Detection Systems (NIDS).
What is the best way to evade the NIDS?
A. Out of band signalling
B. Protocol Isolation
C. Alternate Data Streams
2. You have several plain-text firewall logs that you must review to evaluate
network traffic. You know that in order to do fast, efficent searches of the logs you roust use regular expressions.
Which command-line utility are you most likely to use?