In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

Posted by: Pdfprep Category: GISP Tags: , ,

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?
A . Fragmentation overlap attack
B . Evasion attack
C . Fragmentation overwrite attack
D . Insertion attack

Answer: D

Leave a Reply

Your email address will not be published.