A security analyst has received the following alert snippet from the HIDS appliance: Given the above logs, which of the following is the cause of the attack?

A. The TCP ports on destination are all open
B. FIN, URG, and PSH flags are set in the packet header
C. TCP MSS is configured improperly
D. There is improper Layer 2 segmentation


Answer: B. FIN, URG, and PSH flags are set in the packet header

Computer Science & Information Technology

You might also like to view...

Word inserts a picture into a document as a(n) ________ object

Fill in the blank(s) with correct word

Computer Science & Information Technology

If the functional dependency X ? Y is a key constraint, what are X and Y ?

What will be an ideal response?

Computer Science & Information Technology

Which of the following could be a Word table saved as a database file?

A) Oregon customers.mdb B) Washington_cust.accd C) Oregon_cust.docx D) Washington customers.accdb

Computer Science & Information Technology

A(n) ________ refers to an individual who creates apps for any mobile computing platform

Fill in the blank(s) with correct word

Computer Science & Information Technology