List of questions
Related questions
Question 15 - ECSS discussion
Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.
Identify the attack signature analysis technique performed by Joseph in the above scenario.
A.
Composite-signature-based analysis
B.
Context based signature analysis
C.
Content based signature analysis
D.
Atomic signature based analysis
Your answer:
0 comments
Sorted by
Leave a comment first