CCNA Cyber Ops FAQ: Security Evasion Techniques Q1. Which of the following is when the attacker sends traffic slower than normal, not exceeding thresholds inside the time windows the signatures use to correlate different packets together? A. Traffic insertion B. Protocol manipulation C. Traffic fragmentation D. Timing attack Answer: D. This example represents adjusting … [Read more...]