Exhibit:
You work as an administrator at Certkiller .com. Study the exhibit carefully. In the exhibit, which rule
base would have generated the log message?
A.
traffic anomaly
B.
backdoor
C.
network honeypot
D.
SYN protector
Exhibit:
You work as an administrator at Certkiller .com. Study the exhibit carefully. In the exhibit, which rule
base would have generated the log message?
A.
traffic anomaly
B.
backdoor
C.
network honeypot
D.
SYN protector