Ask Question
15 February, 21:23

Security devices on a network process digital information, such as text files and Web

pages, in the same way. However, which of the following pieces of information might

they handle differently?

a. protocols

b. TCP/IP headers

c. attack signatures

d. port numbers

+1
Answers (2)
  1. 15 February, 23:18
    0
    C. Attack signatures

    Explanation:

    Security devices are devices on a network configured with security protocols and algorithms to detect, prevent and mitigate potential security threats on a network.

    Network protocols are well established programs used to initiate rules and policies that governs network connectivity. Packets generated by protocols are unaffected by security device functions.

    TCP and IP headers on packets holds the port number and IP address of packets to a destination, so the security devices recognizes the features and treats them as normal data.

    Attack signatures are traits of malicious attacks, they carry unique identifiers that can be recognized by anti-virus and intrusion detection and prevention devices and they are discarded or dropped.
  2. 16 February, 00:41
    0
    Attack Signatures

    Explanation:

    Attack Signatures is a unique arrangement of information that can be used to identify an attacker's attempt to exploit a known operating system or application vulnerability. When Intrusion Detection detects an attack signature, it displays a Security Alert.
Know the Answer?
Not Sure About the Answer?
Get an answer to your question ✅ “Security devices on a network process digital information, such as text files and Web pages, in the same way. However, which of the ...” in 📙 Computers & Technology if there is no answer or all answers are wrong, use a search bar and try to find the answer among similar questions.
Search for Other Answers