Skip to content
Equizzing
Home
Quiz Categories
Linux Entry Level
LPI Level 1
LPI Level 2
LPI Level 3
Contact
This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram The datagram is not reassembled
What is this technique called?