The newly appointed trainee technician wants to know what the definition of exploit signatures is in the context of Intrustion detection. What will your reply be?
A.
Exploit Signatures are policies that prevent hackers from your network.
B.
Exploit Signatures are security weak points in your network that are open to exploitation by intruders.
C.
Exploit Signatures are identifiable patterns of attacks detected on your network.
D.
Exploit Signatures are digital graffiti from malicious users.