__________ scans for attack signatures in the context of a traffic stream rather than individual packets.
A. Pattern matching B. Protocol anomaly
C. Traffic anomaly D. Stateful matching
A. Pattern matching
Computer Science & Information Technology
You might also like to view...
A comment begins with the ____ symbols.
A. ?& B. %= C. %+ D. /*
Computer Science & Information Technology
Excel cells can contain text, numbers, or formulas
Indicate whether the statement is true or false
Computer Science & Information Technology
What arithmetic operations are on the same level of precedence as multiplication? ________ .
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What should be on the first line of the first page of an MLA-style research paper?
A) The name of the person for whom the report is prepared B) The report date C) The report title D) The name of the report author
Computer Science & Information Technology