Which of the following best defines what signatures are?

a. IP addresses of known hackers.
b. The email address of known attackers.
c. Indicators of known attacks.
d. None of these answers is correct.


c. Indicators of known attacks.

Computer Science & Information Technology

You might also like to view...

A ____________ contains data that has been encoded as text using a scheme such as ASCII.

a. document (as on MS-Word or Open-Document Format) b. spreadsheet (as in Excel) c. binary file d. text file

Computer Science & Information Technology

In Photoshop, the term ____ refers to specific operations that you make to change the location of pixels.

A. transfer B. change C. relocate D. transform

Computer Science & Information Technology

There was a time when a Web page would be made entirely of words or text. Today, pictures and graphics dominate Web pages, attracting a greater number of visitors than ever before.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A company has just installed a new network switch for an expanding department. The company is also piloting the use of a VoIP phone system for this department. Which of the following should be enabled on the new network switch?

A. WINS B. QoS C. NAT D. DHCP

Computer Science & Information Technology