Which of the following is an advantage of a signature-based detection system?

A. the definition of what constitutes normal traffic changes
B. it is based on profiles the administrator creates
C. each signature is assigned a number and name
D. the IDPS must be trained for weeks


Answer: C

Computer Science & Information Technology

You might also like to view...

File management programs can also be used to _____.

A. ?recover deleted files from the recycle bin B. ?search for stored files that meet specified criteria C. ?duplicate a file so it can be restored at a later date D. ?monitor a file on a computer and block suspicious activity

Computer Science & Information Technology

An internal style sheet is also called a(n) ____ style sheet.

A. text B. embedded C. format D. document

Computer Science & Information Technology

If you want to resize several objects as a single object, you can ________ the individual objects

A) gather B) merge C) format D) group

Computer Science & Information Technology

The base address of an array is the memory location of the first array component.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology