Which one of the following attacks will pass through a network layer intrusion detection system undetected?
A . A teardrop attack
B . A SYN flood attack
C . A DNS spoofing attack
D . A test.cgi attack
Answer: D
Explanation:
Because a network-based IDS reviews packets and headers, it can also detect denial of service (DoS) attacks Not A or B: The following sections discuss some of the possible DoS attacks available. Smurf Fraggle SYN Flood Teardrop DNS DoS Attacks”