Notifications
Clear all
Topic starter
09/10/2022 12:15 am
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events .
Which IDPS technique uses a database that contains known attack patterns?
https://www.examsboost.com/test/dea-1tt5/
- A . Role-based
- B . Profile-based
- C . Signature-based
- D . Anomaly-based
Suggested Answer: C