Which IDPS technique uses a database that contains known attack patterns?
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?A . Role-basedB . Profile-basedC . Signature-basedD . Anomaly-basedView AnswerAnswer: C