An attacker is using fragmentation to avoid our IPS, what is that?
A: Breaking the data into segments.
B: Sending traffic on a well-known TCP port, where we would not expect the malicious traffic.
C: Have many different agents use different IPs and ports.
D: Change the attack signature.
CBK 7: Security Operations
Source: ThorTeaches.com practice tests
A: Fragmentation: Sending fragmented packets, the attack can avoid the detection system’s ability to detect the attack signature.