Which of the following intrusion detection systems (IDS) monitors network traffic and compares it
against an established baseline?
A.
Network-based
B.
Anomaly-based
C.
File-based
D.
Signature-based
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it
against an established baseline?
Which of the following intrusion detection systems (IDS) monitors network traffic and compares it
against an established baseline?
A.
Network-based
B.
Anomaly-based
C.
File-based
D.
Signature-based