Respuesta :
Answer:
Attack Signatures
Explanation:
Attack Signatures is a unique arrangement of information that can be used to identify an attacker's attempt to exploit a known operating system or application vulnerability. When Intrusion Detection detects an attack signature, it displays a Security Alert.
Answer:
C. Attack signatures
Explanation:
Security devices are devices on a network configured with security protocols and algorithms to detect, prevent and mitigate potential security threats on a network.
Network protocols are well established programs used to initiate rules and policies that governs network connectivity. Packets generated by protocols are unaffected by security device functions.
TCP and IP headers on packets holds the port number and IP address of packets to a destination, so the security devices recognizes the features and treats them as normal data.
Attack signatures are traits of malicious attacks, they carry unique identifiers that can be recognized by anti-virus and intrusion detection and prevention devices and they are discarded or dropped.