WhichkeymethodisusedtodetectandpreventattacksbyuseofIDSand/orIPStechnologies?() A.Signature-baseddetectionB.Anomaly-baseddetectionC.HoneypotdetectionD.Policy-baseddetection
WhichkeymethodisusedtodetectandpreventattacksbyuseofIDSand/orIPStechnologies?()
A.Signature-baseddetection
B.Anomaly-baseddetection
C.Honeypotdetection
D.Policy-baseddetection