GIAC Related Exams
GPPA Exam
Which of the following techniques allows probing firewall rule-sets and finding entry points into the targeted system or network?
You work as a Network Administrator for NetTech Inc. Your manager needs to access a particular server on the network from outside the company network. You have a registered IP address assigned to a router on the company network.
Which of the following will be useful for accessing the server from outside the network?
In which of the following IDS evasion techniques does an attacker deliver data in multiple small sized packets, which makes it very difficult for an IDS to detect the attack signatures of such attacks?