What is deep packet inspection?

What will be an ideal response?


DPI is a technique that searches individual network packets for protocol non-compliance and can identify and classify malicious packets based on a database of known attack signatures.

PTS: 1

Computer Science & Information Technology

You might also like to view...

Data import options are listed on Access's IMPORT/EXPORT DATA tab.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What does the VLAN Trunk Protocol (VTP) do?

a. It shares trunking information amongst switches that participate. b. It shares VLAN database information amongst switches that participate. c. It is the protocol used by a trunk port for establishing a trunk with another switch. d. It is the protocol that defines how VLAN tagging is accomplished in an Ethernet network.

Computer Science & Information Technology

A signal has just been received from the WAN link on your network. Using the given components, which of the following shows the path that the signal would take from the WAN to a workstation on your network? Assume all components are used at least once and that some components may be used more than once.1-backbone cabling2-entrance facility3-MDF4-horizontal wiring5-IDF6-work area

A. 2, 1, 3, 4, 5, 4, 6 B. 2, 1, 3, 1, 5, 4, 6 C. 6, 1, 3, 4, 5, 4, 6 D. 2, 1, 5, 1, 3, 4, 6

Computer Science & Information Technology

A major risk exposure in the expenditure cycle is that accounts payable may be overstated at the end of the accounting year.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology