Which of the following would be the BEST solution for an IDS to monitor known attacks?

Which of the following would be the BEST solution for an IDS to monitor known attacks?

Which of the following would be the BEST solution for an IDS to monitor known attacks?

A.
Host-based

B.
Signature-based

C.
Network-based

D.
Behavior-based



Leave a Reply 0

Your email address will not be published. Required fields are marked *