Which of the following is true about the steps in setting up and using an IDPS?
A. anomaly-based systems come with a database of attack signatures
B. sensors placed on network segments will always capture every packet
C. alerts are sent when a packet doesn't match a stored signature
D. false positives do not compromise network security
Answer: D
Computer Science & Information Technology
You might also like to view...
____ allows you to exchange real-time typed messages with people on your buddy list-a list of individuals that you specify.
A. VoIP B. Blogging C. Instant messaging D. Streaming
Computer Science & Information Technology
For users who have difficulty seeing images on the screen, you can include alternate text to your graphics so that these users can see or hear the alternate text when working with your document.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology