GIAC Certified Perimeter Protection Analyst GPPA Question # 29 Topic 3 Discussion

GIAC Certified Perimeter Protection Analyst GPPA Question # 29 Topic 3 Discussion

GPPA Exam Topic 3 Question 29 Discussion:
Question #: 29
Topic #: 3

In which of the following IDS evasion attacks does an attacker send a data packet such that IDS accepts the data packet but the host computer rejects it?


A.

Fragmentation overwrite attack


B.

Fragmentation overlap attack


C.

Evasion attack


D.

Insertion attack


Get Premium GPPA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.