ECCouncil Exam Questions

which of the following vulnerabilities?

The use of alert thresholding in an IDS can reduce the volume of repeated alerts, but introduces which of the
following vulnerabilities?

A.
An attacker, working slowly enough, can evade detection by the IDS.

B.
Network packets are dropped if the volume exceeds the threshold.

C.
Thresholding interferes with the IDS’ ability to reassemble fragmented packets.

D.
The IDS will not distinguish among packets originating from different sources.