Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: validbest

Exam 212-82 All Questions
Exam 212-82 All Questions

View all questions & answers for the 212-82 exam

ECCouncil Cyber Technician (CCT) 212-82 Question # 33 Topic 3 Discussion

212-82 Exam Topic 3 Question 33 Discussion:
Question #: 33
Topic #: 3

Anderson, a security engineer, was Instructed to monitor all incoming and outgoing traffic on the organization's network to identify any suspicious traffic. For this purpose, he employed an analysis technique using which he analyzed packet header fields such as IP options, IP protocols, IP fragmentation flags, offset, and identification to check whether any fields are altered in transit.

Identify the type of attack signature analysis performed by Anderson in the above scenario.


A.

Context-based signature analysis


B.

Atomic-signature-based analysis


C.

Composite-signature-based analysis


D.

Content-based signature analysis


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.