Signature-based monitoring can be described as which of the following?
A) attempts to answer the question: "will this do something harmful if allowed to execute?"
B) compiles a baseline of normal activities and looks for statistical anomalies
C) examines network traffic,activity,and transactions,and looks for well-known patterns
D) continuously analyzes the behavior of processes and alerts the user if abnormal actions are detected
Correct Answer:
Verified
Q9: Which was developed to help users who
Q10: What does WPA include that is designed
Q11: WEP2 attempted to overcome the limitations of
Q12: Which encryption protocol is used for 802.11i/WPA2?
A)
Q13: Which of the following is true about
Q15: Due to the enhancements in WEP2,it was
Q16: What does WPA use for authentication?
A) Kerberos
B)
Q17: Which problem did dynamic WEP resolve?
A) man-in-the-middle
Q18: Kerberos became the heart of the WPA
Q19: What was a design goal of WPA?
A)
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents