Which one of the following techniques can be very effective at avoiding proper detection?

Network Intrusion Detection systems can monitor traffic in real time on networks. Which one of the following techniques can be very effective at avoiding proper detection?

Network Intrusion Detection systems can monitor traffic in real time on networks. Which one of the following techniques can be very effective at avoiding proper detection?

A.
Fragmentation of packets.

B.
Use of only TCP based protocols.

C.
Use of only UDP based protocols.

D.
Use of fragmented ICMP traffic only.

Explanation:
:



Leave a Reply 1

Your email address will not be published. Required fields are marked *


seenagape

seenagape

I have the same idea. A