In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?
A. Insertion
B. Evasion
C. Fragmentation overwrite
D. Fragmentation overlap
In which of the following attacks is a malicious packet rejected by an IDS, but accepted by the host system?
A. Insertion
B. Evasion
C. Fragmentation overwrite
D. Fragmentation overlap