Multiple Choice
To determine whether an attack has occurred or is underway,NIDPSs compare measured activity to known ____ in their knowledge base.
A) fingernails
B) fingerprints
C) signatures
D) footprints
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: The attack _ is a series of
Q8: A(n) _ vulnerability scanner is one that
Q27: Three methods dominate the IDPSs detection methods:
Q28: Nmap uses incrementing Time-To-Live packets to determine
Q30: A(n)partially distributed IDPS control strategy combines the
Q32: Services using the TCP/IP protocol can run
Q36: A passive response is a definitive action
Q70: Preconfigured, predetermined attack patterns are called <u>signatures</u>.
Q74: HIDPSs are also known as system _
Q101: When a collection of honeypots connects several