Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

A. stealth
B. silent
C. planned
D. covert

Answer: A

Computer Science & Information Technology

You might also like to view...

A ________ topology uses more than one topology when building a network

A) crossover B) multiple-use C) fusion D) hybrid

Computer Science & Information Technology

The default width for a text box, such as the one labeled "First Name" in the accompanying figure, is ____ characters.

A. 10 B. 15 C. 20 D. 25

Computer Science & Information Technology