A signature-based IDPS examines network traffic in search of patterns that match known ____.

A. keys
B. addresses
C. signatures
D. phrases


Answer: C

Computer Science & Information Technology

You might also like to view...

Redraw the diagram created in number 2 above after inserting a node containing Chattanooga, 27.6.

What will be an ideal response?

Computer Science & Information Technology

Which command illustrates how to obtain helpful documentation for the ls command?

A. man ls B. help ls C. doc ls D. info ls

Computer Science & Information Technology

If some field values contain data with a consistent pattern, you should define an input mask

Indicate whether the statement is true or false

Computer Science & Information Technology

Which Cisco IOS command is used to configure the OSPF reference bandwidth setting?

A) ospf reference-bandwidth speed B) reference-bandwidth speed C) ip ospf reference bandwidth speed D) auto-cost reference-bandwidth speed

Computer Science & Information Technology