{"id":306,"date":"2022-02-25T19:43:19","date_gmt":"2022-02-25T19:36:53","guid":{"rendered":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question165\/"},"modified":"2022-02-25T19:46:25","modified_gmt":"2022-02-25T19:46:25","slug":"certified-ethical-hacker-v11-312-50v11-question165","status":"publish","type":"post","link":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/certified-ethical-hacker-v11-312-50v11-question165\/","title":{"rendered":"Certified Ethical Hacker v11 312-50v11 &#8211; Question165"},"content":{"rendered":"<div class=\"question\">Kevin, a professional hacker, wants to penetrate CyberTech Inc&#039;s network. He employed a technique, using which he encoded packets with Unicode characters. The company&#039;s IDS cannot recognize the packets, but the target web server can decode them.<br \/>\nWhat is the technique used by Kevin to evade the IDS system?<br \/><strong><br \/>A.<\/strong> Session splicing<br \/><strong>B.<\/strong> Urgency flag<br \/><strong>C.<\/strong> Obfuscating<br \/><strong>D.<\/strong> Desynchronization<\/div>\n<p><\/p>\n<style> .hidden-div{ display:none } <\/style>\n<p>\t\t\t\t\t\t\t<button onclick=\"getElementById('hidden-div').style.display = 'block'\"> Show Answer <\/button> <button onclick=\"getElementById('hidden-div').style.display = 'none'\">Hide Answer<\/button><\/p>\n<div class=\"hidden-div\" id=\"hidden-div\"><span style=\"\"><\/p>\n<div class=\"answer\">Correct Answer: <strong>C<\/strong><\/div>\n<p><\/strong><\/span> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kevin, a professional hacker, wants to penetrate CyberTech Inc&#039;s network. He employed a technique, using which he encoded packets with Unicode characters. The company&#039;s IDS cannot recognize the packets, but the target web server can decode them. What is the technique used by Kevin to evade the IDS system?A. Session splicingB. Urgency flagC. ObfuscatingD. Desynchronization [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[3,168],"class_list":["post-306","post","type-post","status-publish","format-standard","hentry","category-certified-ethical-hacker-v11-312-50v11","tag-certified-ethical-hacker-v11-312-50v11","tag-question-165"],"_links":{"self":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":1,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/306\/revisions"}],"predecessor-version":[{"id":533,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/posts\/306\/revisions\/533"}],"wp:attachment":[{"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/categories?post=306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exampracticetests.com\/eccouncil\/ceh-v11\/wp-json\/wp\/v2\/tags?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}