WhichtypeofintrusionpreventiontechnologywillbeprimarilyusedbytheCiscoIPSsecurityappliances?() A.signature-basedB.profile-basedC.rule-basedD.protocolanalysis-based
WhichtypeofintrusionpreventiontechnologywillbeprimarilyusedbytheCiscoIPSsecurityappliances?()
A.signature-based
B.profile-based
C.rule-based
D.protocolanalysis-based