What are the three types of malicious traffic detection methods?

A) Signature, policy, and anomaly based
B) IDS, IPS, and IRS based
C) NIDS, HIPS, and NIPS based
D) Symmetric, asymmetric, and transparent based


A
Explanation: Consider the following approaches for detecting malicious traffic:
• Signature-based detection
• Policy-based detection
• Anomaly-based detection
The primary method used to detect and prevent attacks using IDS or IPS technologies is signature based. Another approach to IDS/IPS detection is policy based. With a policy-based approach, the IDS/IPS device needs a specific declaration of the security policy. A third approach to detecting or preventing malicious traffic is anomaly based. This approach is prone to false positives because a normal condition is difficult to measurably define.

Computer Science & Information Technology

You might also like to view...

What are the four guidelines for good display design?

What will be an ideal response?

Computer Science & Information Technology

____________________ is the level of detail in an image.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Identify the letter of the choice that best matches the phrase or definition.



1. A Bridge component that hides all files except those specified
2. A file format that uses lossy compression
3. Decreases the resolution of an image
4. An additive color mode
5. A color mode that uses a color lookup table of 256 colors
6. Allows you to cut out image data while also controlling additional features
7. A file format that uses lossless compression
8. Adds pixels to an image
9. Allows you to see a different area of an image
10. A subtractive color mode
11. A file format that can store both vector and bitmap data
12. Information describing how data is formatted or how it was collected

Computer Science & Information Technology

You choose the envelope size from the Envelope Options dialog box

Indicate whether the statement is true or false

Computer Science & Information Technology