Some attackers want to be hidden from network devices or IDSs that recognize an inordinate amount of pings or packets being sent to their networks. Which of the following attacks are more difficult to detect?

A. stealth
B. silent
C. planned
D. covert


Answer: A

Computer Science & Information Technology

You might also like to view...

If a class does not define constructors, the compiler provides a default constructor with no parameters, and the class’s instance variables are initialized to ________.

a. zero b. null c. their default values. d. false

Computer Science & Information Technology

What is a primitive variable?

What will be an ideal response?

Computer Science & Information Technology

In the array implementation, under what circumstances could the rear reference equal 0?

What will be an ideal response?

Computer Science & Information Technology

Seven elements common to stories told by users in the organization are:

What will be an ideal response?

Computer Science & Information Technology