Which of the following monitoring devices are used only to recognize suspicious traffic from
specific software?
A.
Signature based IPS
B.
Application based IDS
C.
Anomaly based IDS
D.
Application based IPS
Explanation:
An APIDS monitors the dynamic behavior and state of the protocol and will typically consist of a
system or agent that would typically sit between a process, or group of servers, monitoring and
analyzing the application protocol between two connected devices.