To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.

A. vulnerabilities
B. fingerprints
C. signatures
D. footprints

Answer: C

Computer Science & Information Technology

You might also like to view...

The case logic structure algorithm:

a. Starts with an IF and ends with an IF/END. b. Starts with a CASE OF VARIABLE and ends with the OTHERWISE. c. Starts with a CASE OF VARIABLE and ends with an END-OF-CASE. d. None of the above.

Computer Science & Information Technology

What are portable-specific expansion slots?

What will be an ideal response?

Computer Science & Information Technology