Which of the following is a network intrusion detection technique?
A.
Statistical anomaly
B.
Perimeter intrusion
C.
Port scanning
D.
Network spoofing
Which of the following is a network intrusion detection technique?
Which of the following is a network intrusion detection technique?
A.
Statistical anomaly
B.
Perimeter intrusion
C.
Port scanning
D.
Network spoofing