To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.
A. vulnerabilities
B. fingerprints
C. signatures
D. footprints
Answer: C
Computer Science & Information Technology
You might also like to view...
A microcontroller is a type of CPU that has ________ functionality
A) limited B) uni-task C) limitless D) tiered
Computer Science & Information Technology
To compare and merge workbooks, the workbooks cannot be shared
Indicate whether the statement is true or false
Computer Science & Information Technology
All of the comments tools are located on the ____________________ tab of the Ribbon in the Comments group.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
All forms must include a _____, which viewers click to transfer the form data to the web server.
A. file field B. Reset button C. Submit button D. setting field
Computer Science & Information Technology