Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?

Which of the following monitoring devices are used only to recognize suspicious traffic from specific software?
A. Signature based IPS
B. Application based IDS
C. Anomaly based IDS
D. Application based IPS

comptia-exams

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.