Choose the terminology used to refer to the situation when authorized access is perceived as an intrusion or network attack.

Choose the terminology used to refer to the situation when authorized access is perceived as an
intrusion or network attack.

Choose the terminology used to refer to the situation when authorized access is perceived as an
intrusion or network attack.

A.
False intrusion

B.
False positive

C.
False negative

D.
False alarm

Explanation:

False intrusion is a false alarm, when there is no need of any alarm.
Not B: A false positive is when legitimate traffic is picked up as an intruder.



Leave a Reply 0

Your email address will not be published. Required fields are marked *