Blacklists and whitelists are most commonly used in ____ detection and stateful protocol analysis.
A. blacklist
B. signature-based
C. statistical anomaly-based
D. behavior-based
Answer: B
Computer Science & Information Technology
You might also like to view...
__________ takes advantage of the extreme speed disparity between a computer and its peripheral devices.
a. Multiprogramming b. Virtual memory c. Spooling d. Polling
Computer Science & Information Technology
How should academic titles be typeset?
What will be an ideal response?
Computer Science & Information Technology
Compare and contrast the four types of action queries
What will be an ideal response?
Computer Science & Information Technology
Which form (which will include the existing fields from the data source) can be created with just one click?
A) Blank Form B) Stacked layout C) Form Wizard D) Tabular layout
Computer Science & Information Technology