A weakness of a signature-based system is that it must keep state information on a possible attack.

Answer the following statement true (T) or false (F)


True

Computer Science & Information Technology

You might also like to view...

Which of the following determines the operator that is processed prior to another operator?

a) Operator associativity b) Operator precedence c) Whether the operator is an arithmetic operator d) None of these determine the order in which operators are processed.

Computer Science & Information Technology

Which of the following is a property of a file or folder that shows whether or not a file or folder has been backed up since it was last modified?

A. read-only attribute B. archive attribute C. modified attribute D. differential attribute

Computer Science & Information Technology

Always use absolute units for font sizes to give users maximum flexibility for viewing the Web page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you point to an object on the desktop, a(n) ________ box with information about the object is displayed

A) ScreenInfo B) InformationTip C) ScreenTip D) InfoTip

Computer Science & Information Technology