Which one of the following controls would be most effective in detecting zero-day attack attempts?
A. Signature-based intrusion detection
B. Anomaly-based intrusion detection
C. Strong patch management
D. Full-disk encryption
Answer: B. Anomaly-based intrusion detection
You might also like to view...
Programming languages that use instructions resembling written languages, such as English, are referred to as high-level languages.
Answer the following statement true (T) or false (F)
Pressing Ctrl+G opens the ________ tab of the Find and Replace dialog box
Fill in the blank(s) with correct word
Using good grammar, describe how you can determine how much memory to install in a system
What will be an ideal response?
Local Security ________ and Group ________ both enable you to set software restriction policies (SRP) and application control policies
a. Definitions b. Containers c. Policy d. None of the above