Which one of the following types of IDS evasion techniques uses Unicode, ASCII shell code, and encryption?

a. Invalid RST
b. Obfuscation
c. Post-connection SYN
d. Pre-connection SYN

ANS: B

Computer Science & Information Technology

You might also like to view...

Deleting a shortcut or alias will delete the file or folder to which it links

Indicate whether the statement is true or false

Computer Science & Information Technology

________ instructions operate on the bits of a word as bits rather than as numbers, providing capabilities for processing any other type of data the user may wish to employ.

A. Logic B. Arithmetic C. Memory D. Test

Computer Science & Information Technology