Which of the following is true?

A. Deep Packet Inspection uses a variety of analytical and statistical techniques to evaluate the contents of message packets.
B. An Intrusion prevention system works in parallel with a firewall at the perimeter of the network to act as a filer that removes malicious packets from the flow before they can affect servers and networks.
C. A distributed denial of service attack is so named because it is capable of attacking many victims simultaneously who are distributed across the internet.
D. None of the above are true statements.

Answer: A

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true in relation to digital rights management (DRM)?

A) It imposes restrictions on the use of files. B) It can be found on files such as music, eBooks, and videos. C) It is a technology applied to digital media files. D) It can legally be removed from a file.

Computer Science & Information Technology

Port scanning provides the state for all but which of the following ports?

a. Closed b. Open c. Filtered d. Buffered

Computer Science & Information Technology