New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmasmnth

Most NIDS systems operate in layer 2 of the OSI model.

Most NIDS systems operate in layer 2 of the OSI model. These systems feed raw traffic into a detection engine and rely on the pattern matching and/or statistical analysis to determine what is malicious. Packets are not processed by the host's TCP/IP stack allowing the NIDS to analyze traffic the host would otherwise discard. Which of the following tools allows an attacker to intentionally craft packets to confuse pattern-matching NIDS systems, while still being correctly assembled by the host TCP/IP stack to render the attack payload?

A.

Defrag

B.

Tcpfrag

C.

Tcpdump

D.

Fragroute

ECCouncil EC0-350 Summary

  • Vendor: ECCouncil
  • Product: EC0-350
  • Update on: Dec 16, 2025
  • Questions: 878
Price: $52.5  $149.99
Buy Now EC0-350 PDF + Testing Engine Pack

Payments We Accept

Your purchase with ExamsVCE is safe and fast. Your products will be available for immediate download after your payment has been received.
The ExamsVCE website is protected by 256-bit SSL from McAfee, the leader in online security.

examsvce payment method