PdfPrep.com

Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together?

Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together?
A . Traffic insertion
B . Protocol manipulation
C . Traffic fragmentation
D . Timing attack

Answer: D

Exit mobile version