__________ scans for attack signatures in the context of a traffic stream rather than individual packets.

A. Pattern matching B. Protocol anomaly

C. Traffic anomaly D. Stateful matching

A. Pattern matching

Computer Science & Information Technology

You might also like to view...

The proper extension for a macro-enabled template is .domt

Indicate whether the statement is true or false

Computer Science & Information Technology

Archive bits are used by incremental backup to decide what to backup

a. true b. false

Computer Science & Information Technology