subject

This IDS defeating techniques works by splitting a datagram or packet into multiple fragments and the IDS will not spot the true nature of the fully assembled datagram. the datagram is not reassembled until it reaches its final destination. It would be a processor-intensive task for an IDS to reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the network. what is this technique called?

A. IP routing or packet dropping
B. IP splicing or packet reassesmbly
C. IDS spoofing or session assembly
D. IP fragmentation or Session splicing

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 18:00
Which of the following is a true statement about milestones
Answers: 1
question
Computers and Technology, 24.06.2019 06:30
Ineed to know the anwser to all these questions
Answers: 2
question
Computers and Technology, 24.06.2019 08:10
Where are american poets found in the dewey decimal system
Answers: 1
question
Computers and Technology, 25.06.2019 07:00
Asap 50 points ( paragraph pls) discuss the role of the concept behind the "internet of things (iot)" in today's digitally connected society.
Answers: 2
You know the right answer?
This IDS defeating techniques works by splitting a datagram or packet into multiple fragments and th...
Questions
Questions on the website: 13722363