Which of the following monitoring methodologies will allow a technician to determine when there is a security related problem that results in an abnormal condition?

Which of the following monitoring methodologies will allow a technician to determine when there is a security related problem that results in an abnormal condition?

Which of the following monitoring methodologies will allow a technician to determine when there is a security related problem that results in an abnormal condition?

A.
Signature-based

B.
NIDS

C.
Anomaly-based

D.
NIPS



Leave a Reply 0

Your email address will not be published. Required fields are marked *