Which one of the following types of IDS evasion techniques uses Unicode, ASCII shell code, and encryption?
a. Invalid RST
b. Obfuscation
c. Post-connection SYN
d. Pre-connection SYN
ANS: B
Computer Science & Information Technology
You might also like to view...
Deleting a shortcut or alias will delete the file or folder to which it links
Indicate whether the statement is true or false
Computer Science & Information Technology
________ instructions operate on the bits of a word as bits rather than as numbers, providing capabilities for processing any other type of data the user may wish to employ.
A. Logic B. Arithmetic C. Memory D. Test
Computer Science & Information Technology