List of questions
Related questions
Question 46 - D-ISM-FN-23 discussion
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.
Which IDPS technique uses a database that contains known attack patterns?
A.
Intrusion-based
B.
Policy-based
C.
Anomaly- Based
D.
Signature-based
Your answer:
0 comments
Sorted by
Leave a comment first