.Which of the following is true of signature-based IDSes? a) They alert administrators to deviations from “normal” traffic behavior b) They identify previously unknown attacks c) The technology is mature and reliable enough to use on production networks d) They scan network traffic or packets to identify matches with attack-definition files
.Which of the following is true of signature-based IDSes? a) They alert administrators to deviations from “normal” traffic behavior b) They identify previously unknown attacks c) The technology is mature and reliable enough to use on production networks d) They scan network traffic or packets to identify matches with attack-definition files
Share
Answer: d
d) They scan network traffic or packets to identify matches with attack-definition files
D. All of above
D. All of above
d) They scan network traffic or packets to identify matches with attack-definition files
D. they scan network traffic or packets to identify matches with attack-definition files
D. they scan network traffic or packets to identify matches with attack-definition files
D. they scan network traffic or packets to identify matches with attack-definition files