Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic, is resource intensive, and requires extensive tuning and maintenance?

A. brute force
B. heuristic
C. signature
D. anomaly


Answer: B

Computer Science & Information Technology

You might also like to view...

What routing protocols are used in this network?

What will be an ideal response?

Computer Science & Information Technology

Windows XP’s __________ is an application programming interface that supports the capture and playback of audio, full-color video, and 3-D graphics and such multimedia peripheral devices as a joystick.

a. DirectX b. Windows Media feature c. MP3 d. MPEG4

Computer Science & Information Technology

It is necessary to use equal signs in arguments

Indicate whether the statement is true or false

Computer Science & Information Technology

You can perform all of the following with the Start screen tiles EXCEPT ________ them

A) remove B) add C) share D) rearrange

Computer Science & Information Technology