Which of the following is an IDS evasion technique used by attackers to encode an attack packet payload in such a manner that the destination host can decode the packet but not the IDS?

A. Evasion
B. Session splicing
C. Obfuscating
D. Fragmentation


Answer: C. Obfuscating

Sociology

You might also like to view...

The typical professional presentation of research findings is how long?

a. 2 minutes or less b. 2-5 minutes c. 10-15 minutes d. 30-45 minutes e. 60-90 minutes

Sociology

A statue of a religious figure is a ______.

A. myth B. ritual C. symbol D. orthodoxy

Sociology

In Robert Merton's typology, drug dealers would be considered

a. conformists. c. ritualists. b. innovators. d. retreatists.

Sociology

Relationships by blood, marriage, or affection, in which members may cooperate economically, may care for children, and may consider their identity to be intimately connected to the larger group define a/an:

A. domestic partner. B. fictive kin. C. family. D. human agency.

Sociology