Which of the following would be the BEST solution for an IDS to monitor known attacks?
A.
Host-based
B.
Signature-based
C.
Network-based
D.
Behavior-based
Which of the following would be the BEST solution for an IDS to monitor known attacks?
Which of the following would be the BEST solution for an IDS to monitor known attacks?
A.
Host-based
B.
Signature-based
C.
Network-based
D.
Behavior-based