Ask Question
30 March, 15:06

Security devices on a network process digital information, such as text files and Web

pages, in the same way. However, which of the following pieces of information might

they handle differently?

a. protocols

b. TCP/IP headers

c. attack signatures

d. port numbers

+4
Answers (2)
  1. 30 March, 15:31
    0
    C. Attack signatures

    Explanation:

    Security devices are devices on a network configured with security protocols and algorithms to detect, prevent and mitigate potential security threats on a network.

    Network protocols are well established programs used to initiate rules and policies that governs network connectivity. Packets generated by protocols are unaffected by security device functions.

    TCP and IP headers on packets holds the port number and IP address of packets to a destination, so the security devices recognizes the features and treats them as normal data.

    Attack signatures are traits of malicious attacks, they carry unique identifiers that can be recognized by anti-virus and intrusion detection and prevention devices and they are discarded or dropped.
  2. 30 March, 15:33
    0
    Attack Signatures

    Explanation:

    Attack Signatures is a unique arrangement of information that can be used to identify an attacker's attempt to exploit a known operating system or application vulnerability. When Intrusion Detection detects an attack signature, it displays a Security Alert.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Security devices on a network process digital information, such as text files and Web pages, in the same way. However, which of the ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers