Which of the following monitoring devices are used only to recognize suspicious traffic from
specific software?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Signature based IPS
B.
Application based IDS
C.
Anomaly based IDS
D.
Application based IPS
Explanation:
An APIDS monitors the dynamic behavior and state of the protocol and will typically consist of a
system or agent that would typically sit between a process, or group of servers, monitoring and
analyzing the application protocol between two connected devices.