Which of the following rulebases will he use to accomplish the task?

John works as a Security Manager for Gentech Inc. He uses an IDP engine to detect the type of interactive traffic produced during an attack in which the attacker wants to install the mechanism on a host system that facilitates the unauthorized access and breaks the system confidentiality.

Which of the following rulebases will he use to accomplish the task?
A . Traffic Anomalies rulebase
B . SYN Protector rulebase
C . Backdoor rulebase
D . Exempt rulebase

Answer: C

Latest GPPA Dumps Valid Version with 285 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments