Which of the following are used in an attack detected by an IDS?

Which of the following are used in an attack detected by an IDS?

Which of the following are used in an attack detected by an IDS?

A.
An event-based ID or a statistical anomaly-based ID

B.
A discrete anomaly-based ID or a signature-based ID

C.
A signature-based ID or a statistical anomaly-based ID

D.
A signature-based ID or an event-based ID

Explanation:
An IDS detects an attack through a signature-based ID or a statisticalanomaly-based ID. Signature-based IDS are the most popular IDS products today, andtheir effectiveness depends upon regularly updating the software with newsignatures, as with antivirus software. A statistical anomaly-based IDS is abehavioral-based system. Behavioral-based IDS products do not use predefinedPage 7cess trol-P5.txtsignatures, but rather are put in a learning mode to build a profile of anenvironment’s "normal" activities.



Leave a Reply 0

Your email address will not be published. Required fields are marked *