问题:
A . It reverse engineers and documents the attack
B . It looks subjectively at network traffic for abnormal flows of behavior
C . It creates a signature and updates the network security policies
D . It actively monitors all vulnerable areas of the network
● 参考解析
本题暂无解析
相关内容
相关标签