Valid D-ISM-FN-23 Dumps shared by ExamDiscuss.com for Helping Passing D-ISM-FN-23 Exam! ExamDiscuss.com now offer the newest D-ISM-FN-23 exam dumps, the ExamDiscuss.com D-ISM-FN-23 exam questions have been updated and answers have been corrected get the newest ExamDiscuss.com D-ISM-FN-23 dumps with Test Engine here:
A company is using an intrusion detection and prevention system (IDPS) to scan and analyze intrusion events. Which IDPS technique uses a database that contains known attack patterns?
Correct Answer: D
Signature-based IDPS uses a database that contains known attack patterns or signatures. Each signature is associated with a particular type of attack and the IDPS will look for those patterns in order to identify malicious activity. For example, if the signature in the database is associated with a buffer overflow attack, the IDPS will look for that particular pattern of attack in order to detect the attack.