Which technique of an intrusion detection and prevention system relies on a database that contains known attack patterns, and scans events against it?
A . Signature-based detection
B . Anomaly-based detection
C . Device-based detection
D . Plug-in-based detection
Answer: A
Latest D-CIS-FN-23 Dumps Valid Version with 370 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund