A signature-based IDPS examines network traffic in search of patterns that match known ____.
A. keys
B. addresses
C. signatures
D. phrases
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following is NOT a type of graphic?
A. Video B. Chart C. Photograph D. WordArt
Computer Science & Information Technology
Buildings should be set back from streets and protected with rolling hill landscaping to reduce threats from ________.
A. wireless eavesdropping B. industrial espionage C. terrorism D. casual observation
Computer Science & Information Technology