A ___________ makes use of both signature and anomaly detection techniques to identify attacks.

Fill in the blank(s) with the appropriate word(s).


host-based IPS (HIPS)

Computer Science & Information Technology

You might also like to view...

Files and folders on an NTFS file system in Windows 7 cannot use Unicode characters in the filename.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The ratio of successive Fibonacci numbers converges on a constant value of 1.618…, a number that has been called the ____________ or the ______________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When the Accounting Number Format is applied, a negative number displays with a negative sign, such as -5 or -6

Indicate whether the statement is true or false

Computer Science & Information Technology

A color with 100 percent ____ is located at the outside of the color wheel.

a. saturation b. hue c. brightness d. contrast

Computer Science & Information Technology