1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lutik1710 [3]
3 years ago
7

Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures i

n their knowledge base to determine whether or not an attack has occurred or may be under way.
Computers and Technology
1 answer:
ser-zykov [4K]3 years ago
8 0

Answer:

signature matching

Explanation:

Based on the scenario being described within the question it can be said that the process being described is known as signature matching. This process revolves around organizing, navigating through, and retrieving from software libraries in order to try and match to something that has already happened in order to better understand it and maybe prevent/stop the attack.

You might be interested in
How to change screen brightness windows 10?
astraxan [27]
Click on the Notification icon at the bottom right of the screen -> Choose 'Expand' -> Then you will see the sun icon, click on that to choose the brightness. Thank you

4 0
4 years ago
Software that function as an electronic file cabinet
Airida [17]

Answer:

The answer to this question is "Document management software".

Explanation:

Document management software is software that provides a facility to stores data in an organized manner. It manages and tracks its electronic documents.

  • This software controls many fields, that are Storage location, Security and access control, Version control, etc.
  • It is a common component, that is found in an Enterprise Content Management environment, that uses this software.

7 0
3 years ago
Care and feeding for computer
o-na [289]
Don’t drop it and charge it regularly
5 0
3 years ago
What is the problem, if any, with the following code?The desired output is [3,19].
vfiekz [6]

Answer: You need a temporary variable to hold the value 3

Explanation:

So, aList[0] is 3 and aList[1] is 19, if it will be as it is you litteraly say to the compiler to change aList[0] to aList[1]  at this moment aList[0] is 19 and aList[1] also is 19 and if you try to change aList[1] to aList[0]  it will not change its value because they are the same.

You need temp variable to keep one of the values.

8 0
3 years ago
Use the drop-down menus to complete the statements about creating a table of contents in Word 2016.
siniylev [52]

Answer:

1.headings and subheadings

2.manually

3.options

6 0
3 years ago
Other questions:
  • When CPU failed what will happen?
    10·1 answer
  • what aspect should you consider before adding pictures to a document? you should structure the first before you search for a rel
    15·2 answers
  • Can someone help me with this one
    9·2 answers
  • A tablet computer transmits a file over a wi-fi link to an access point.
    13·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    6·1 answer
  • PLS I NEED HELP Question 6<br> 1 pts<br> What is NOT a built-in function in python?
    5·1 answer
  • Explain the basic operations of a computer system​
    6·1 answer
  • Fwee Pwoints Fwor You
    11·2 answers
  • Which of the listed tools would a barber likely use in the following scenario?
    15·1 answer
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!