which three situations would you create a compound attack object?

In which three situations would you create a compound attack object? (Choose three.)

In which three situations would you create a compound attack object? (Choose three.)

A.
When the pattern “@@@@@@@@” and context “ftp-get-filename” completely define the
attack.

B.
When attack objects must occur in a particular order.

C.
When one of the attack objects is a protocol anomaly.

D.
When the pattern needs to be defined using a stream 256 context.

E.
You have at least two attack objects that define a single attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *