PdfPrep.com

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?
A . Fragmentation overlap attack
B . Evasion attack
C . Fragmentation overwrite attack
D . Insertion attack

Answer: D

Exit mobile version