List of questions
Related questions
Question 39 - 112-51 discussion
Joseph, a security professional, was instructed to secure the organization's network. In this process, he began analyzing packet headers to check whether any indications of source and destination IP addresses and port numbers are being changed during transmission.
Identify the attack signature analysis technique performed by Joseph in the above scenario.
A.
Composite-signature-based analysis
B.
Context-based signature analysis
C.
Content-based signature analysis
D.
Atomic-signature-based analysis
Your answer:
0 comments
Sorted by
Leave a comment first