Question: Which technique involves attackers mimicking normal user behavior to remain undetected by an IDS ?
Which technique involves attackers mimicking normal user behavior to remain undetected by an IDS ?
Step by Step Solution
There are 3 Steps involved in it
The technique youre referring to is called masquer... View full answer
Get step-by-step solutions from verified subject matter experts
