__________ scans for attack signatures in the context of a traffic stream rather than individual packets.

A. Pattern matching B. Protocol anomaly

C. Traffic anomaly D. Stateful matching


A. Pattern matching

Computer Science & Information Technology

You might also like to view...

A comment begins with the ____ symbols.

A. ?& B. %= C. %+ D. /*

Computer Science & Information Technology

Excel cells can contain text, numbers, or formulas

Indicate whether the statement is true or false

Computer Science & Information Technology

What arithmetic operations are on the same level of precedence as multiplication? ________ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What should be on the first line of the first page of an MLA-style research paper?

A) The name of the person for whom the report is prepared B) The report date C) The report title D) The name of the report author

Computer Science & Information Technology