Blacklists and whitelists are most commonly used in ____ detection and stateful protocol analysis.

A. blacklist
B. signature-based
C. statistical anomaly-based
D. behavior-based


Answer: B

Computer Science & Information Technology

You might also like to view...

__________ takes advantage of the extreme speed disparity between a computer and its peripheral devices.

a. Multiprogramming b. Virtual memory c. Spooling d. Polling

Computer Science & Information Technology

How should academic titles be typeset?

What will be an ideal response?

Computer Science & Information Technology

Compare and contrast the four types of action queries

What will be an ideal response?

Computer Science & Information Technology

Which form (which will include the existing fields from the data source) can be created with just one click?

A) Blank Form B) Stacked layout C) Form Wizard D) Tabular layout

Computer Science & Information Technology