The IT manager is evaluating IPS products to determine which would be most effective at stopping
network traffic that contains anomalous content on networks that carry very specific types of traffic.
Based on the IT manager’s requirements, which of the following types of IPS products would be
BEST suited for use in this situation?
A.
Signature-based
B.
Rate-based
C.
Anomaly-based
D.
Host-based
this should be anomaly-based.