MATCHING
-Signs of possible attacks that include an IP address,a port number,and the frequency of access attempts; an IDPS uses signatures to detect possible attacks
A) auditing
B) biometrics
C) DMZ
D) DDoS attack
E) packet filters
F) port
G) RBAC
H) signatures
I) socket
J) worm
Correct Answer:
Verified
Q22: Which type of firewall policy calls for
Q23: MATCHING
-An attack in which many computers are
Q24: MATCHING
-The process of recording which computers are
Q25: Which of the following is NOT information
Q26: MATCHING
-A method of authenticating a user using
Q28: _ are spread by several methods,including running
Q29: With which access control method do system
Q30: MATCHING
-Hardware or software tools that allow or
Q31: MATCHING
-Computer files that copy themselves repeatedly and
Q32: Which security tool works by recognizing signs
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents