The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as
A) an intrusion prevention system.
B) stateful packet filtering.
C) static packet filtering.
D) deep packet inspection.
Answer: A
Business
You might also like to view...
In the context of a research program conducted at the university of Michigan, planning, scheduling, coordinating, providing resources, and setting performance goals is known as ____ behavior
Fill in the blank(s) with the appropriate word(s).
Business
A securities issuer that has reported continuously under the 1934 Act for at least three years is a(n):
A) well-known seasoned issuer. B) seasoned issuer. C) unseasoned issuer. D) None of these.
Business