Which of the following devices can Sara, an administrator, implement to detect and stop known
attacks?
A.
Signature-based NIDS
B.
Anomaly-based NIDS
C.
Signature-based NIPS
D.
Anomaly-based NIPS
Which of the following devices can Sara, an administrator, implement to detect and stop known
attacks?
Which of the following devices can Sara, an administrator, implement to detect and stop known
attacks?
A.
Signature-based NIDS
B.
Anomaly-based NIDS
C.
Signature-based NIPS
D.
Anomaly-based NIPS