Which of the following signatures watches for the connection attempts to well-known, frequently attacked ports?
Port signatures watch for connection attempts to well-known, frequently attacked ports. These type of signatures are used in Network-based ID systems, which involve looking at the packets on the network as they pass by some sensor. The packets are identified to be of interest if they match a signature.
Answer option D is incorrect. String signatures look for a text string that indicates a possible attack.
Answer option C is incorrect. Header signatures watch for dangerous or illogical combinations in packet headers.
Answer option B is incorrect. Digital signature is an authentication tool that is used to ensure the integrity and non-repudiation of a presentation. It is used to authenticate the presentation by using a cryptographic mechanism. The document for a digital signature can be a presentation, a message, or an email.
Nakisha
4 months agoWerner
4 months agoMaybelle
4 months agoFrankie
4 months agoBonita
4 months agoRory
5 months agoClaribel
5 months agoVincenza
5 months agoClay
5 months agoOlive
5 months agoTomas
5 months ago