Which of the following is an accurate set of characteristics you would find in an attack signature?
A. IP address, attacker's alias, UDP options
B. protocol options, TCP ports, region of origin
C. IP address, TCP flags, port numbers
D. IP number, MAC address, TCP options
Answer: C
You might also like to view...
When using the window.confirm() method, if the user hits the Cancel button, ____.
A. a loop will execute B. a value of true is returned C. the dialog box remains open D. a value of false is returned
The maximum length according to the standards for a PATA IDE cable is _______ inches
Fill in the blank(s) with correct word
Thunderbolt 3 offers throughput up to _______________ Gbps at half the power consumption of Thunderbolt 2.
A. 10 B. 20 C. 30 D. 40
Item A in the accompanying figure is the _______________ .
Fill in the blank(s) with the appropriate word(s).