Which one of the following controls would be most effective in detecting zero-day attack attempts?

A. Signature-based intrusion detection
B. Anomaly-based intrusion detection
C. Strong patch management
D. Full-disk encryption

Answer: B. Anomaly-based intrusion detection

Computer Science & Information Technology

You might also like to view...

Additional instructions that determine how a macro action should run are called ________

A) action arguments B) masks C) controls D) placeholders

Computer Science & Information Technology

In Visual C#, you use the ____________ to create a list box on an application’s form.

a. List View control b. Masked Text Box control c. Checked List Box control d. List Box control

Computer Science & Information Technology