Slide 1Ethical Hacking Module XIX Evading IDS, Firewalls and Honey pots Slide 2 EC-Council Module Objective Intrusion Detection System System Integrity Verifiers How are…