What is an advantage of the anomaly detection method?
A. makes use of signatures of well-known attacks
B. system can detect attacks from inside the network by people with stolen accounts
C. easy to understand and less difficult to configure than a signature-based system
D. after installation, the IDPS is trained for several days or weeks
Answer: B
You might also like to view...
Match the following terms to their meanings:
I. Form Header II. Section bar III. Form Footer IV. Record selector bar A. prints only on last page if forms are printed as a group B. printed on the top of the first page when records are printed as forms C. gray line in a form or report that identifies and separates one section from another D. used to select an entire record in Form view
In proper database design, you should set the Required field property to Yes for ________ fields
Fill in the blank(s) with correct word