Which IDPS technique uses a database that contains known attack patterns?

Posted by: Pdfprep Category: DEA-1TT4 Tags: , ,

A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events.

Which IDPS technique uses a database that contains known attack patterns?
A . Role-based
B . Profile-based
C . Signature-based
D . Anomaly-based

Answer: C

Reference: https://pdfs.semanticscholar.org/e874/32283e90da5bceb3b17550570ec3a210f43c.pdf

Leave a Reply

Your email address will not be published.