Exam Name: | Ethical Hacking and Countermeasures V8 | ||
Exam Code: | EC0-350 Dumps | ||
Vendor: | ECCouncil | Certification: | Certified Ethical Hacker |
Questions: | 878 Q&A's | Shared By: | emile |
Which types of detection methods are employed by Network Intrusion Detection Systems (NIDS)? (Choose two.)
A hacker is attempting to use nslookup to query Domain Name Service (DNS). The hacker uses the nslookup interactive mode for the search. Which command should the hacker type into the command shell to request the appropriate records?
One advantage of an application-level firewall is the ability to