Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 72 Topic 8 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 72 Topic 8 Discussion

312-50v13 Exam Topic 8 Question 72 Discussion:
Question #: 72
Topic #: 8

During a red team exercise at Apex Logistics in Denver, ethical hacker Rachel launches controlled packet injection attacks to simulate session hijacking attempts. The client's IT team wants a way to automatically detect such abnormal behaviors across the network in real time, instead of relying on manual analysis. They decide to deploy a monitoring system capable of flagging suspicious session activity based on predefined rules and traffic signatures.

Which detection method best fits the IT team's requirement?


A.

Check for predictable session tokens


B.

Perform manual packet analysis using sniffing tools


C.

Monitor for ACK storms


D.

Use an Intrusion Detection System (IDS)


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.