Practice Test Geeks home

Certified Ethical Hacker Session Hijacking and Evading IDS Firewalls 2

Which IDS evasion technique involves breaking a single exploit into multiple small packets that individually appear harmless?

Select your answer