PrepAway - Latest Free Exam Questions & Answers

What is this technique called?

This IDS defeating technique works by splitting a datagram (or packet) into multiple fragments and
the IDS will not spot the true nature of the fully assembled datagram. The datagram is not
reassembled until it reaches its final destination. It would be a processor-intensive task for IDS to
reassemble all fragments itself, and on a busy system the packet will slip through the IDS onto the
network. What is this technique called?

PrepAway - Latest Free Exam Questions & Answers

A.
IP Routing or Packet Dropping

B.
IDS Spoofing or Session Assembly

C.
IP Fragmentation or Session Splicing

D.
IP Splicing or Packet Reassembly


Leave a Reply