Posted by: Pdfprep
Post Date: November 30, 2020
Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together?
A . Traffic insertion
B . Protocol manipulation
C . Traffic fragmentation
D . Timing attack
Answer: D
Leave a Reply