Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Which of these is not necessarily a good way to prevent zero-day attacks? Monito

ID: 3819565 • Letter: W

Question

Which of these is not necessarily a good way to prevent zero-day attacks? Monitor behaviors of running applications in real-time and block program activity that appears malicious. Look for anomalies in behavior of protocols such as HTTP or SMTP which might indicate an effort to exploit programming errors, such as buffer overflows. Block signatures of well-known attack vectors, since the majority of attacks are based on published exploits. Throttle viruses by sacrificing a small number of machines at the network perimeter, then determining an inoculation for the rest of the interior network.

Explanation / Answer

I think the 4th option is not needed necessarily...The above three options were necessary for monitoring system performance from being attacked by the attackers.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote