ECCouncil Related Exams
312-38 Exam
Identify the attack signature analysis technique carried out when attack signatures are contained in packet headers.
Which of the following is an example of MAC model?