Which technique of an intrusion detection and prevention system relies on a database that
contains known attack patterns, and scans events against it?

A.
Anomaly-based detection
B.
Device-based detection
C.
Signature-based detection
D.
Plug-in-based detection