__________ scans for attack signatures in the context of a traffic stream rather than individual packets.
A) Pattern matching
B) Protocol anomaly
C) Traffic anomaly
D) Stateful matching
Correct Answer:
Verified
Q24: A _ makes use of both signature
Q25: An example of a circuit-level gateway implementation
Q26: The _ protocol is an example of
Q27: The _ attack is designed to circumvent
Q28: Identified as a critical strong point in
Q30: A _ configuration involves stand-alone firewall devices
Q31: _ looks for deviation from standards set
Q32: A _ uses encryption and authentication in
Q34: _ protocols operate in networking devices, such
Q38: A _ firewall applies a set of
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents