Question

Which of the following is true about the steps in setting up and using an IDPS?
a. anomaly-based systems come with a database of attack signatures c. alerts are sent when a packet doesn"t match a stored signature
b. sensors placed on network segments will always capture every packet d. false positives do not compromise network security

Answer

This answer is hidden. It contains 11 characters.