Which of the following is an advantage of a signature-based detection system?
A. the definition of what constitutes normal traffic changes
B. it is based on profiles the administrator creates
C. each signature is assigned a number and name
D. the IDPS must be trained for weeks
Answer: C
You might also like to view...
File management programs can also be used to _____.
A. ?recover deleted files from the recycle bin B. ?search for stored files that meet specified criteria C. ?duplicate a file so it can be restored at a later date D. ?monitor a file on a computer and block suspicious activity
An internal style sheet is also called a(n) ____ style sheet.
A. text B. embedded C. format D. document
If you want to resize several objects as a single object, you can ________ the individual objects
A) gather B) merge C) format D) group
The base address of an array is the memory location of the first array component.
Answer the following statement true (T) or false (F)