List of questions
Related questions
Question 377 - 312-38 discussion
Which of the following attack signature analysis techniques are implemented to examine the header information and conclude that a packet has been altered?
A.
Composite signature-based analysis
B.
Atomic signature-based analysis
C.
Content-based signature analysis
D.
Context-based signature analysis
Your answer:
0 comments
Sorted by
Leave a comment first