B. Protocol Isolation
C. Alternate Data Streams
D. Out of band signalling
Scroll down for answer
The following books are highly recommended to progress your CEH v10 studies.
When the NIDS encounters encrypted traffic, the only analysis it can perform is packet level analysis, since the application layer contents are inaccessible. Given that exploits against today's networks are primarily targeted against network services (application layer entities), packet level analysis ends up doing very little to protect our core business assets.
CEH v10 EC Council questions and answers.
FREE PDF Download of all CEH v10 exam questions and answers.