Which one of the following controls would be most effective in detecting zero-day attack attempts?

A. Signature-based intrusion detection
B. Anomaly-based intrusion detection
C. Strong patch management
D. Full-disk encryption


Answer: B. Anomaly-based intrusion detection

Computer Science & Information Technology

You might also like to view...

Programming languages that use instructions resembling written languages, such as English, are referred to as high-level languages.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Pressing Ctrl+G opens the ________ tab of the Find and Replace dialog box

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using good grammar, describe how you can determine how much memory to install in a system

What will be an ideal response?

Computer Science & Information Technology

Local Security ________ and Group ________ both enable you to set software restriction policies (SRP) and application control policies

a. Definitions b. Containers c. Policy d. None of the above

Computer Science & Information Technology