Which one of the following attacks will pass through a network layer intrusion detection system undetected?
A.
A teardrop attack
B.
A SYN flood attack
C.
A DNS spoofing attack
D.
A test.cgi attack
Explanation:
Because a network-based IDS reviews packets and headers, it can also detect denial of service (DoS) attacksNot A or B:
The following sections discuss some of the possible DoS attacks available.Smurf
Fraggle
SYN Flood
Teardrop
DNS DoS Attacks"