Packet fragmentation, source routing, and IP address spoofing are attempts to circumvent detection techniques employed by IDS.

a. true
b. false


Answer: a. true

Computer Science & Information Technology

You might also like to view...

All of the following can cause a fatal execution-time error except:

a. Dereferencing a pointer that has not been assigned to point to a specific address. b. Dereferencing a pointer that has not been initialized properly. c. Dereferencing a null pointer. d. Dereferencing a variable that is not a pointer.

Computer Science & Information Technology

In terms of the relationship between work=duration * units when changes are made to a task after a resource assignment, if you modify or add work, the duration changes to balance the formula.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What certificate type can be put on a smart card to verify a user's identity?

A. Client computer certificate B. Server certificate C. root certificate D. User certificate

Computer Science & Information Technology

Cryptographic hash functions have a huge number of uses, but a common one is for verifying file __________.

A. integrity B. encryption C. structure D. fragmentation

Computer Science & Information Technology