Which of the following BEST describes this type of IDS?

A security administrator needs to implement a system that detects possible intrusions based upon a vendor
provided list. Which of the following BEST describes this type of IDS?

A security administrator needs to implement a system that detects possible intrusions based upon a vendor
provided list. Which of the following BEST describes this type of IDS?

A.
Signature based

B.
Heuristic

C.
Anomaly-based

D.
Behavior-based



Leave a Reply 0

Your email address will not be published. Required fields are marked *