Q: 18
Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the
organization's network to identify any suspicious traffic. For this purpose, he employed an analysis
technique using which he analyzed packet header fields such as IP options, IP protocols, IP
fragmentation flags, offset, and identification to check whether any fields are altered in transit.
Identify the type of attack signature analysis performed by Anderson in the above scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.