Which of the following devices can Sara, an administrator, implement to detect and stop known attacks?
A.
Signature-based NIDS
B.
Anomaly-based NIDS
C.
Signature-based NIPS
D.
Anomaly-based NIPS
Which of the following devices can Sara, an administrator, implement to detect and stop known attacks?
Which of the following devices can Sara, an administrator, implement to detect and stop known attacks?
A.
Signature-based NIDS
B.
Anomaly-based NIDS
C.
Signature-based NIPS
D.
Anomaly-based NIPS