Choose the terminology used to refer to the situation when authorized access is perceived as an
intrusion or network attack.
A.
False intrusion
B.
False positive
C.
False negative
D.
False alarm
Explanation:
False intrusion is a false alarm, when there is no need of any alarm.
Not B: A false positive is when legitimate traffic is picked up as an intruder.