Which one of the following controls would be most effective in detecting zero-day attack attempts?
A. Signature-based intrusion detection
B. Anomaly-based intrusion detection
C. Strong patch management
D. Full-disk encryption
Answer: B. Anomaly-based intrusion detection
Computer Science & Information Technology
You might also like to view...
Additional instructions that determine how a macro action should run are called ________
A) action arguments B) masks C) controls D) placeholders
Computer Science & Information Technology
In Visual C#, you use the ____________ to create a list box on an application’s form.
a. List View control b. Masked Text Box control c. Checked List Box control d. List Box control
Computer Science & Information Technology