Q: 16
In which of the following IDS evasion techniques does IDS reject the packets that an end system
accepts?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.