Three methods dominate IDPS detection methods: the ____________________-based approach, the statistical anomaly-based approach, and the stateful packet inspection approach.
Fill in the blank(s) with the appropriate word(s).
signature
Computer Science & Information Technology
You might also like to view...
A report formatted so that the data can be printed on a sheet of labels
A) Label report B) Merge report C) Mail report
Computer Science & Information Technology
One common vulnerability exploitation method is a_______, in which a program is overwhelmed by an input of more data than it has allocated space for.
a) buffer overflow. b) memory flood. c) buffer flood. d) None of the above
Computer Science & Information Technology