GIAC Information Security Professional GISP Question # 168 Topic 17 Discussion

GIAC Information Security Professional GISP Question # 168 Topic 17 Discussion

GISP Exam Topic 17 Question 168 Discussion:
Question #: 168
Topic #: 17

John works as a professional Ethical Hacker. He has been assigned a project for testing the security of www.we-are-secure.com. He wants to corrupt an IDS signature database so that performing attacks on the server is made easy and he can observe the flaws in the We-are-secure server. To perform his task, he first of all sends a virus that continuously changes its signature to avoid detection from IDS. Since the new signature of the virus does not match the old signature, which is entered in the IDS signature database, IDS becomes unable to point out the malicious virus. Which of the following IDS evasion attacks is John performing?


A.

Session splicing attack


B.

Evasion attack


C.

Insertion attack


D.

Polymorphic shell code attack


Get Premium GISP Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.