Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?
A. Host based IPS
B. Network based firewall
C. Signature based IDS
D. Behavior based IPS
Answer: C. Signature based IDS
Computer Science & Information Technology
You might also like to view...
You can modify the locations included in a library, but the location must be indexed by which of the following?
A. File Explorer B. Libraries C. Windows Search D. Documents
Computer Science & Information Technology
Field types in an OpenOffice Base database are defined in Design View of a table
Indicate whether the statement is true or false
Computer Science & Information Technology
Private corporate internal networks are called ____.
A. intranets B. internets C. extranets D. corpnets
Computer Science & Information Technology
Another name for event logging is
A) Authentication B) Authorization C) Encryption D) None of these are names for event logging.
Computer Science & Information Technology