Suspicious traffic without a specific signature was detected. Under further investigation, it was
determined that these were false indicators. Which of the following security devices needs to be
configured to disable future false alarms?
A.
Signature based IPS
B.
Signature based IDS
C.
Application based IPS
D.
Anomaly based IDS