Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?
A. Signature based IPS
B. Application based IDS
C. Anomaly based IDS
D. Application based IPS
Answer: B. Application based IDS
You might also like to view...
Assuming outFile is a file stream object and number is a variable, which statement writes the contents of number to the file associated with outFile?
a. write(outFile, number); b. outFile >> number; c. outFile << number; d. number >> outFile;
Which of the following tree traversals traverses the subtrees from left to right and then visits the root?
a) Preorder b) Inorder c) Postorder d) Level-order e) none of the above
Suppose two header files t1.h and t2.h contain the declarations for class T. What happens if you include both header files in your program?
A. The program will compile fine and the first header file that is included is used. B. You will get multiple declaration error if the header files don't have the include guard. C. The compile will automatically decides which implementation to use. D. The program will compile fine and the first header file that is included is used if the header files have the include guard.
When designing a power subsystem, form factor matters
Indicate whether the statement is true or false