Packet fragmentation, source routing, and IP address spoofing are attempts to circumvent detection techniques employed by IDS.
a. true
b. false
Answer: a. true
You might also like to view...
All of the following can cause a fatal execution-time error except:
a. Dereferencing a pointer that has not been assigned to point to a specific address. b. Dereferencing a pointer that has not been initialized properly. c. Dereferencing a null pointer. d. Dereferencing a variable that is not a pointer.
In terms of the relationship between work=duration * units when changes are made to a task after a resource assignment, if you modify or add work, the duration changes to balance the formula.
Answer the following statement true (T) or false (F)
What certificate type can be put on a smart card to verify a user's identity?
A. Client computer certificate B. Server certificate C. root certificate D. User certificate
Cryptographic hash functions have a huge number of uses, but a common one is for verifying file __________.
A. integrity B. encryption C. structure D. fragmentation