Which of the following monitoring devices are used only to recognize suspicious traffic from specific
software?
A.
Signature based IPS
B.
Application based IDS
C.
Anomaly based IDS
D.
Application based IPS
Which of the following monitoring devices are used only to recognize suspicious traffic from specific
software?
Which of the following monitoring devices are used only to recognize suspicious traffic from specific
software?
A.
Signature based IPS
B.
Application based IDS
C.
Anomaly based IDS
D.
Application based IPS