Network Intrusion Detection systems can monitor traffic in real time on networks. Which one of the following techniques can be very effective at avoiding proper detection?
A.
Fragmentation of packets.
B.
Use of only TCP based protocols.
C.
Use of only UDP based protocols.
D.
Use of fragmented ICMP traffic only.
Explanation:
:
I have the same idea. A