Which of the following monitoring methodologies will allow a technician to determine when there is a security related problem that results in an abnormal condition?
A.
Signature-based
B.
NIDS
C.
Anomaly-based
D.
NIPS
Which of the following monitoring methodologies will allow a technician to determine when there is a security related problem that results in an abnormal condition?
Which of the following monitoring methodologies will allow a technician to determine when there is a security related problem that results in an abnormal condition?
A.
Signature-based
B.
NIDS
C.
Anomaly-based
D.
NIPS