A security analyst at your company wants to make sure packets coming from the Internet accessing your public Web servers are protected from HTTP packets that do not meet standards.
Which attack object will protect your infrastructure from nonstandard packets?
A.
signature attack objects
B.
compound protocol attack objects
C.
protocol anomaly attack objects
D.
the HTTP anomaly screen
I agree with the answer. C