Which of the following IDS/firewall evasion techniques is used by an attacker to bypass Internet censors and evade certain IDS and firewall rules?
A. IP address decoy
B. Sending bad checksums
C. Source port manipulation
D. Anonymizers
Answer: D. Anonymizers
You might also like to view...
______________ is first-hand knowledge gained by living and working among those being studied
a. Solidarity c. Social research b. Sympathetic knowledge d. Double consciousness
Examine the possible reasons for the wartime evacuation of Japanese Americans
What will be an ideal response?
Shinto is a native Japanese religion that emphasizes love of
A. elders. B. nature. C. cohesion. D. integration.
Which theoretical area tries to overcome sociology’s historical emphasis on production by focusing on the use of goods and services?
a. Theories of Consumption b. Theories of Globalization c. Theories of Science, Technology, and Society d. Postmodern Social Theory