To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.

A. vulnerabilities
B. fingerprints
C. signatures
D. footprints


Answer: C

Computer Science & Information Technology

You might also like to view...

A microcontroller is a type of CPU that has ________ functionality

A) limited B) uni-task C) limitless D) tiered

Computer Science & Information Technology

To compare and merge workbooks, the workbooks cannot be shared

Indicate whether the statement is true or false

Computer Science & Information Technology

All of the comments tools are located on the ____________________ tab of the Ribbon in the Comments group.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

All forms must include a _____, which viewers click to transfer the form data to the web server.

A. file field B. Reset button C. Submit button D. setting field

Computer Science & Information Technology