The security technology that evaluates IP packet traffic patterns in order to identify attacks against a system is known as

A) an intrusion prevention system.
B) stateful packet filtering.
C) static packet filtering.
D) deep packet inspection.

Answer: A

Business

You might also like to view...

In the context of a research program conducted at the university of Michigan, planning, scheduling, coordinating, providing resources, and setting performance goals is known as ____ behavior

Fill in the blank(s) with the appropriate word(s).

Business

A securities issuer that has reported continuously under the 1934 Act for at least three years is a(n):

A) well-known seasoned issuer. B) seasoned issuer. C) unseasoned issuer. D) None of these.

Business