Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

A. Signature based IPS
B. Application based IDS
C. Anomaly based IDS
D. Application based IPS

Answer: B. Application based IDS

Computer Science & Information Technology

You might also like to view...

ScreenTips provide access to menus in Chrome

Indicate whether the statement is true or false

Computer Science & Information Technology

What are the four typical components of an IDPS?

What will be an ideal response?

Computer Science & Information Technology