IPS devices work based on specific intrusion prevention mechanisms. Which of the following is the correct ranking of intrusion prevention mechanisms?

IPS devices work based on specific intrusion prevention mechanisms. Which of the following is the correct ranking of intrusion prevention mechanisms?
A . Feature matching->Reorganize application data->Protocol identification and protocol parsing->Response processing
B . Reorganize application data->Protocol identification and protocol parsing->Feature matching->Response processing
C . Reorganize application data->Feature matching->Protocol identification and protocol parsing->Response processing
D . Protocol identification and protocol parsing->Reorganize application data->Feature matching->Response processing

Answer: B

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments