A signature-based IDPS examines network traffic in search of patterns that match known ____.

A. keys
B. addresses
C. signatures
D. phrases

Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT a type of graphic?

A. Video B. Chart C. Photograph D. WordArt

Computer Science & Information Technology

Buildings should be set back from streets and protected with rolling hill landscaping to reduce threats from ________.

A. wireless eavesdropping B. industrial espionage C. terrorism D. casual observation

Computer Science & Information Technology