Pattern matching is a characteristic of which type of IDS?

A. Anomaly-based
B. Rule-based
C. Signature-based
D. Heuristic-based


C
Explanation: Pattern-matching compares traffic to a database of attack patterns. The IDS carries out specific steps when it detects traffic that matches an attack pattern. This is a version of signature-based detection.

Computer Science & Information Technology

You might also like to view...

The procedures associated with unfriendly terminations are generally no different from those associated with friendly ones.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case-Based Critical Thinking QuestionJohn is using PowerPoint to create an extensive marketing presentation and he keeps modifying the same slide layout by adding new placeholders for pictures and adjusting the text indents in the content placeholder. John wants to modify his presentation so he can work more efficiently. John wants to rename the new master, Marketing. Where can he find the Rename button?

A. In the Edit Master group. B. In the Edit Layouts group. C. In the Slide Master group. D. In the Rename group.

Computer Science & Information Technology

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

A. buffer overflow B. session hijacking C. social engineering D. denial-of-service

Computer Science & Information Technology

Access and PowerPoint are not included in all configurations of Microsoft Office 2016.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology