Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
A hacker breaks down an attack into various packets and they pass through the IDS. However, when reassembled at the receiving system, they compromise the host. This is an example of ______.
Session splicing
Packet splicing
Session splitting
Session hijacking
techinically packet splicing could be the answer ,so this choice must be changed EDIT: Question describes session splicing; see "IDFAQ: How does an attacker evade Intrusion Detection Systems with Session Splicing?" (https://www.sans.org/security-resources/idfaq/how-does-an-attacker-evade-intrusion-detection-systems-with-session-splicing/2/21)
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.