Multiple Choice
Which method for detecting certain types of attacks uses an algorithm to detect suspicious traffic,is resource intensive,and requires extensive tuning and maintenance?
A) brute force
B) heuristic
C) signature
D) anomaly
Correct Answer:

Verified
Correct Answer:
Verified
Q12: An IDPS consists of a single device
Q13: MATCHING<br>-the entire length of an attack<br>A)accountability<br>B)escalated<br>C)event horizon<br>D)inline
Q14: MATCHING<br>-an IDPS component that monitors traffic on
Q15: Which approach to stateful protocol analysis involves
Q16: An NIDPS can tell you whether an
Q18: What are the three network defense functions
Q19: MATCHING<br>-the ability to track an attempted attack
Q20: MATCHING<br>-an NIDPS sensor that examines copies of
Q21: List four types of information that an
Q22: Which of the following is a sensor