Notifications
Clear all
Topic starter
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.
Which IDPS technique uses a database that contains known attack patterns?
- A . Intrusion-based
B. Policy-based
C. Anomaly. based
D. Signature-based
Suggested Answer: C
Posted : 30/01/2023 11:43 am