Which of the following is considered a problem with a passive, signature-based system?

A. profile updating
B. signature training
C. custom rules
D. false positives

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following enables the attacker to attack and debug web applications?

a. Cookies b. URL obfuscation c. Cross-site scripting d. Web proxies

Computer Science & Information Technology

When you have a cin >> statement that uses a pointer and indirection operator, or a reference parameter, where is the data being placed by the cin statement?

What will be an ideal response?

Computer Science & Information Technology