Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

Which of the following monitoring devices are used only to recognize suspicious traffic from specific
software?

Which of the following monitoring devices are used only to recognize suspicious traffic from specific
software?

A.
Signature based IPS

B.
Application based IDS

C.
Anomaly based IDS

D.
Application based IPS



Leave a Reply 0

Your email address will not be published. Required fields are marked *