Exhibit:
You work as an administrator at Certkiller .com. Study the exhibit carefully. In the exhibit, which rule
base would have generated the log message?
A.
traffic anomaly
B.
network honeypot
C.
backdoor
D.
SYN protector
Explanation:
Exhibit:
You work as an administrator at Certkiller .com. Study the exhibit carefully. In the exhibit, which rule
base would have generated the log message?
A.
traffic anomaly
B.
network honeypot
C.
backdoor
D.
SYN protector
Explanation: