Which of the following is an accurate set of characteristics you would find in an attack signature?

A. IP address, attacker's alias, UDP options
B. protocol options, TCP ports, region of origin
C. IP address, TCP flags, port numbers
D. IP number, MAC address, TCP options


Answer: C

Computer Science & Information Technology

You might also like to view...

When using the window.confirm() method, if the user hits the Cancel button, ____.

A. a loop will execute B. a value of true is returned C. the dialog box remains open D. a value of false is returned

Computer Science & Information Technology

The maximum length according to the standards for a PATA IDE cable is _______ inches

Fill in the blank(s) with correct word

Computer Science & Information Technology

Thunderbolt 3 offers throughput up to _______________ Gbps at half the power consumption of Thunderbolt 2.

A. 10 B. 20 C. 30 D. 40

Computer Science & Information Technology

Item A in the accompanying figure is the _______________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology