单项选择题
A.Signature-based NIPS
B.Signature-based NIDS
C.Honeypot
D.Behavior-based HIDS
单项选择题 WhichofthefollowingistheLEASTintrusivewayofcheckingtheenvironmentforknownsoftwareflaws?()
单项选择题 Anadministratorwantstoproactivelycollectinformationonattackersandtheirattemptedmethodsofgainingaccesstotheinternalnetwork.Whichofthefollowingwouldallowtheadministratortodothis?()
单项选择题 Whichofthefollowingwouldanattackerusetofootprintasystem?()