Q: 13
George, a certified security professional, was hired by an organization to ensure that the server
accurately responds to customer requests. In this process, George employed a security solution to
monitor the network traffic toward the server. While monitoring the traffic, he identified attack
signatures such as SYN flood and ping of death attempts on the server.
Which of the following categories of suspicious traffic signature has George identified in the above
scenario?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.