Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

Which of the following monitoring devices are used only to recognize suspicious traffic from
specific software?

Which of the following monitoring devices are used only to recognize suspicious traffic from
specific software?

A.
Signature based IPS

B.
Application based IDS

C.
Anomaly based IDS

D.
Application based IPS

Explanation:
An APIDS monitors the dynamic behavior and state of the protocol and will typically consist of a
system or agent that would typically sit between a process, or group of servers, monitoring and
analyzing the application protocol between two connected devices.



Leave a Reply 0

Your email address will not be published. Required fields are marked *