In the context of intrusion detection, what is the definition of exploit signatures?
A.
Policies that prevent hackers from your network.
B.
Security weak points in your network that can be exploited by intruders.
C.
Identifiable patterns of attack detected on your network.
D.
Digital graffiti from malicious users.
E.
Certificates that authenticate authorized users.