Which client traffic would be identified as an attack?

Click the Exhibit button. You configured a custom signature attack object to match specific
components of an attack: Which client traffic would be identified as an attack?

Click the Exhibit button. You configured a custom signature attack object to match specific
components of an attack: Which client traffic would be identified as an attack?

A.
HTTP POST .*x909090 … 90

B.
HTTP GET .*x909090 … 90

C.
HTTP POST .*\x90 90 90 … 90

D.
HTTP GET .*\x90 90 90 … 90



Leave a Reply 0

Your email address will not be published. Required fields are marked *