What type of monitoring compares network traffic, activities, transactions, or behavior against a database of known attack patterns?
A. application-based
B. protocol-based
C. behavioral-based
D. signature-based
Answer: D
Computer Science & Information Technology
You might also like to view...
A mouse motion listener class can respond to:
A) The mouse button is clicked on B) The mouse cursor exits a component's screen space C) The mouse moved D) The mouse button is released
Computer Science & Information Technology
COUNTA is an example of a(n) ________ function
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
The Mini toolbar is not customizable.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In Linux, the command _____ is used to create a new directory.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology