A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero
day exploits. Which of the following should be deployed?
A.
Behavior based IPS
B.
Signature based IDS
C.
Antivirus software
D.
Access Control Lists
A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero
day exploits. Which of the following should be deployed?
A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero
day exploits. Which of the following should be deployed?
A.
Behavior based IPS
B.
Signature based IDS
C.
Antivirus software
D.
Access Control Lists