Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic, is resource intensive, and requires extensive tuning and maintenance?
A. brute force
B. heuristic
C. signature
D. anomaly
Answer: B
Computer Science & Information Technology
You might also like to view...
What routing protocols are used in this network?
What will be an ideal response?
Computer Science & Information Technology
Windows XP’s __________ is an application programming interface that supports the capture and playback of audio, full-color video, and 3-D graphics and such multimedia peripheral devices as a joystick.
a. DirectX b. Windows Media feature c. MP3 d. MPEG4
Computer Science & Information Technology
It is necessary to use equal signs in arguments
Indicate whether the statement is true or false
Computer Science & Information Technology
You can perform all of the following with the Start screen tiles EXCEPT ________ them
A) remove B) add C) share D) rearrange
Computer Science & Information Technology