A security analyst has received the following alert snippet from the HIDS appliance: Given the above logs, which of the following is the cause of the attack?
A. The TCP ports on destination are all open
B. FIN, URG, and PSH flags are set in the packet header
C. TCP MSS is configured improperly
D. There is improper Layer 2 segmentation
Answer: B. FIN, URG, and PSH flags are set in the packet header
Computer Science & Information Technology
You might also like to view...
Word inserts a picture into a document as a(n) ________ object
Fill in the blank(s) with correct word
Computer Science & Information Technology
If the functional dependency X ? Y is a key constraint, what are X and Y ?
What will be an ideal response?
Computer Science & Information Technology
Which of the following could be a Word table saved as a database file?
A) Oregon customers.mdb B) Washington_cust.accd C) Oregon_cust.docx D) Washington customers.accdb
Computer Science & Information Technology
A(n) ________ refers to an individual who creates apps for any mobile computing platform
Fill in the blank(s) with correct word
Computer Science & Information Technology