Which of the following is an IDS evasion technique used by attackers to encode an attack packet payload in such a manner that the destination host can decode the packet but not the IDS?
A. Evasion
B. Session splicing
C. Obfuscating
D. Fragmentation
Answer: C. Obfuscating
Sociology
You might also like to view...
The typical professional presentation of research findings is how long?
a. 2 minutes or less b. 2-5 minutes c. 10-15 minutes d. 30-45 minutes e. 60-90 minutes
Sociology
A statue of a religious figure is a ______.
A. myth B. ritual C. symbol D. orthodoxy
Sociology
In Robert Merton's typology, drug dealers would be considered
a. conformists. c. ritualists. b. innovators. d. retreatists.
Sociology
Relationships by blood, marriage, or affection, in which members may cooperate economically, may care for children, and may consider their identity to be intimately connected to the larger group define a/an:
A. domestic partner. B. fictive kin. C. family. D. human agency.
Sociology