ExamGecko
Home Home / F5 / 101
Question list
Search
Search

Related questions











Question 55 - 101 discussion

Report
Export

The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?

A.
Positive
Answers
A.
Positive
B.
Context-based
Answers
B.
Context-based
C.
Negative
Answers
C.
Negative
D.
Role-based
Answers
D.
Role-based
Suggested answer: C

Explanation:

https //www.dosarrpst.com'ddos-blog/the-difference-between-positive-s-negatto-wafi

asked 24/09/2024
Nelson Alvaro
49 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first