GIAC Certified Perimeter Protection Analyst GPPA Question # 27 Topic 3 Discussion

GIAC Certified Perimeter Protection Analyst GPPA Question # 27 Topic 3 Discussion

GPPA Exam Topic 3 Question 27 Discussion:
Question #: 27
Topic #: 3

John works as a Security Manager for Gentech Inc. He uses an IDP engine to detect the type of interactive traffic produced during an attack in which the attacker wants to install the mechanism on a host system that facilitates the unauthorized access and breaks the system confidentiality.

Which of the following rulebases will he use to accomplish the task?


A.

Traffic Anomalies rulebase


B.

SYN Protector rulebase


C.

Backdoor rulebase


D.

Exempt rulebase


Get Premium GPPA Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.