Attackers circumvent IDSs by implementing techniques such as:
A. Packet fragmentation
B. UDP port scans
C. NAT translation
D. TCP scans
Answer: A. Packet fragmentation
Computer Science & Information Technology
You might also like to view...
Which of the following should be used when throughput to the destination network is a priority?
A. MTU B. Hop count C. Reliability of the path D. Bandwidth
Computer Science & Information Technology
How many words should be in the abstract of a report??
A. ?50 to 100 words B. 100 to 150 words? C. ?150 to 200 words D. ?200 to 250 words
Computer Science & Information Technology