Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together?
A . Traffic insertion
B . Protocol manipulation
C . Traffic fragmentation
D . Timing attack

Answer: D

Leave a Reply

Your email address will not be published.