List of questions
Related questions
Question 36 - 212-82 discussion
Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.
Identify the type of attack signature analysis performed by Anderson in the above scenario.
A.
Context-based signature analysis
B.
Atomic-signature-based analysis
C.
Composite-signature-based analysis
D.
Content-based signature analysis
Your answer:
0 comments
Sorted by
Leave a comment first