Which of the following is considered a problem with a passive, signature-based system?
A. profile updating
B. signature training
C. custom rules
D. false positives
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following enables the attacker to attack and debug web applications?
a. Cookies b. URL obfuscation c. Cross-site scripting d. Web proxies
Computer Science & Information Technology
When you have a cin >> statement that uses a pointer and indirection operator, or a reference parameter, where is the data being placed by the cin statement?
What will be an ideal response?
Computer Science & Information Technology