What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?

A. application-based
B. protocol-based
C. behavioral-based
D. signature-based


Answer: D

Computer Science & Information Technology

You might also like to view...

A mouse motion listener class can respond to:

A) The mouse button is clicked on B) The mouse cursor exits a component's screen space C) The mouse moved D) The mouse button is released

Computer Science & Information Technology

COUNTA is an example of a(n) ________ function

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Mini toolbar is not customizable.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In Linux, the command _____ is used to create a new directory.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology