List of questions
Related questions
Question 16 - 2V0-41.23 discussion
Which two statements are true about IDS Signatures? (Choose two.)
A.
Users can upload their own IDS signature definitions.
B.
An IDS signature contains data used to identify known exploits and vulnerabilities.
C.
An IDS signature contains data used to identify the creator of known exploits and vulnerabilities.
D.
IDS signatures can be High Risk, Suspicious, Low Risk and Trustworthy.
E.
An IDS signature contains a set of instructions that determine which traffic is analyzed.
Your answer:
0 comments
Sorted by
Leave a comment first