Certified Ethical Hacker (CEH) Practice Question

During a penetration test, you have already sniffed a victim's TCP session cookie on a corporate LAN and plan to inject your own data into the stream to capture credentials. Before sending the forged packets, you want to minimize the chance that the network's signature- and anomaly-based IDS will detect the hijacking attempt. Which technique provides the most reliable method of evading the IDS while still allowing the victim's TCP stack to accept your injected data?

  • Throttle the TCP window size field to the minimum to exhaust the IDS's session table and make it drop tracking state.

  • Launch an ARP cache-poisoning attack first, hoping the IDS will ignore traffic that appears to stay on the local segment.

  • Split the malicious payload into multiple small TCP segments with overlapping sequence numbers so only the target host-not the IDS-reassembles the altered bytes.

  • Spoof the packet's source IP and use varying TTL values to force asymmetric routing around the IDS sensor.

Certified Ethical Hacker (CEH)
Network and Perimeter Hacking
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot