A security analyst at your company wants to make sure packets coming from the Internet accessing your public Web servers are protected from HTTP packets that do not meet standards.
Which attack object will protect your infrastructure from nonstandard packets?
signature attack objects
compound protocol attack objects
protocol anomaly attack objects
the HTTP anomaly screen