Which of the following techniques is commonly used by attackers to evade anomaly-based IDS detection?
Mimicking normal network behavior
Bribing IT personnel
Encrypting network communication
Exploiting previously unknown vulnerabilities

Information Security Exercises are loading ...