Multiple Choice
MATCHING
-Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks
A) auditing
B) biometrics
C) DMZ
D) DDoS attack
E) packet filters
F) port
G) RBAC
H) signatures
I) socket
J) worm
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q21: A packet monkey is an unskilled programmer
Q22: What tool do you use to secure
Q23: Which type of attack works by an
Q24: MATCHING<br>-An access control method that establishes organizational
Q25: A _ is reserved for a program
Q27: With discretionary access control,network users can share
Q28: Defense in depth can best be described
Q29: Compare and contrast virus and worm.
Q30: A hactivist can best be described as
Q31: Which of the following is NOT one