EC-CouncilEC-Council
212-82 · Question #89
212-82 Question #89: Real Exam Question with Answer & Explanation
Sign in or unlock 212-82 to reveal the answer and full explanation for question #89. The question stem and answer options stay visible for context.
Submitted by cyberguy42· Mar 6, 2026Cloud Security Risks & Threat Mitigation
Question
Kevin, a professional hacker, wants to penetrate CyberTech Inc.'s network. He employed a technique, using which he encoded packets with Unicode characters. The company's IDS cannot recognize the packet, but the target web server can decode them. What is the technique used by Kevin to evade the IDS system?
Options
- ADesynchronization
- BObfuscating
- CSession splicing
- DUrgency flag
Unlock 212-82 to see the answer
You've previewed enough free 212-82 questions. Unlock 212-82 for full answers, explanations, the timed quiz mode, progress tracking, and the master PDF. Question stem and options stay visible so you can still see what's on the exam.
Topics
#IDS evasion#Obfuscation#Attack techniques#Network security