An attacker is using fragmentation to avoid our IPS, what is that?
A: Breaking the data into segments.
B: Sending traffic on a well-known TCP port, where we would not expect the malicious traffic.
C: Have many different agents use different IPs and ports.
D: Change the attack signature.
CBK 7: Security Operations
Source: ThorTeaches.com practice tests
A: Fragmentation: Sending fragmented packets, the attack can avoid the detection system’s ability to detect the attack signature.
IT & Cyber Security trainer
Sharing my knowledge, to help you reach your IT certification goals.
CISSP, C|EH, PMP, CCNP, CompTIA Security+, SCP, CCNA-Security, CCNA, et. Al.