Multiple Choice
To determine whether an attack has occurred or is underway, NIDPSs compare measured activity to known __________ in their knowledge base.
A) vulnerabilities
B) fingerprints
C) signatures
D) footprints
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q72: The Simple Network Management Protocol contains trap
Q73: The primary advantages of a centralized IDPS
Q74: HIDPSs are also known as system _
Q75: A false positive is the failure of
Q76: Intrusion _ activities finalize the restoration of
Q78: A(n) _ IDPS can adapt its reactions
Q79: A(n) _ IDPS is focused on protecting
Q80: For Linux or BSD systems, a tool
Q81: Alarm _ and compaction is a consolidation
Q82: _ is the process of classifying IDPS