To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.
A. vulnerabilities
B. fingerprints
C. signatures
D. footprints
Answer: C
Computer Science & Information Technology
You might also like to view...
The case logic structure algorithm:
a. Starts with an IF and ends with an IF/END. b. Starts with a CASE OF VARIABLE and ends with the OTHERWISE. c. Starts with a CASE OF VARIABLE and ends with an END-OF-CASE. d. None of the above.
Computer Science & Information Technology
What are portable-specific expansion slots?
What will be an ideal response?
Computer Science & Information Technology