Which tool is an intrusion detection system based on attack signatures?

A. nmap
B. Wireshark
C. Snort
D. Tripwire


Answer: C

Computer Science & Information Technology

You might also like to view...

Starting from your current directory, find and delete all instances of myfile and ask for confirmation before deletion.

What will be an ideal response?

Computer Science & Information Technology

Which key is used to stop debugging?

A. F5 B. Shift-F5 C. F11 D. Ctrl-F10

Computer Science & Information Technology

The ____________________ option of the Scale attribute of a Flash movie scales the movie to the exact dimensions set in W and H, regardless of the aspect ratio of the movie.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____ involves scanning the HTTP host field and directing clients to different Web servers based on the host being requested.

A. URL redirection B. NAT C. IP forwarding D. User authentication

Computer Science & Information Technology