Video upload date:  · Duration: PT1H46M27S  · Language: EN

One of the following is an IDS evasion eccouncil video

ethical-hacker video for one of the following is an IDS evasion technique used by an attacker to send a huge amount of unnecessary traffic to produce noise or

This is a dedicated watch page for a single video.

Full Certification Question

One of the following is an IDS evasion technique used by an attacker to send a huge amount of unnecessary traffic to produce noise or fake traffic. If the IDS does not analyze the noise traffic, the true attack traffic goes undetected. Which is this IDS evasion technique?