A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.
A. baseline detection
B. anomaly detection
C. behavior detection
D. signature detection
Answer: D
You might also like to view...
Explain in detail how to animate a symbol along a path, including an explanation of the use of motion paths in your response.
What will be an ideal response?
When converting a report to a Web page, the only available option in the Export — HTML Document dialog box is to:
A) create the Web page for viewing in Internet Explorer version 5.0 or higher or Netscape version 3.0 or higher. B) open the page in a Web browser after the export is complete. C) open only the selected records. D) create the Web page for viewing in Internet Explorer version 5.0 or higher.
A left tab stop:
A) aligns the right edge of the text with the tab stop. B) centers the text around the tab stop. C) aligns the left edge of the text with the tab stop. D) aligns decimal points at the tab stop.
A VPN connection that is set to time out after 24 hours is demonstrating which model of access control?
A. Role-based access control B. Attribute-based access control C. Discretionary access control D. Mandatory access control