The network security engineer just deployed an IDS on the network, but the Chief Technical
Officer (CTO) has concerns that the device is only able to detect known anomalies. Which of the
following types of IDS has been deployed?
A.
Signature Based IDS
B.
Heuristic IDS
C.
Behavior Based IDS
D.
Anomaly Based IDS