Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 75 Topic 8 Discussion

ECCouncil Certified Ethical Hacker Exam (CEHv13) 312-50v13 Question # 75 Topic 8 Discussion

312-50v13 Exam Topic 8 Question 75 Discussion:
Question #: 75
Topic #: 8

A cybersecurity consultant suspects attackers are attempting to evade an Intrusion Detection System (IDS). Which technique is most likely being used?


A.

Deploying self-replicating malware


B.

Fragmenting malicious packets into smaller segments


C.

Flooding the IDS with ICMP packets


D.

Sending phishing emails


Get Premium 312-50v13 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.