A security administrator needs to implement a system that detects possible intrusions based upon a vendor
provided list. Which of the following BEST describes this type of IDS?
A.
Signature based
B.
Heuristic
C.
Anomaly-based
D.
Behavior-based
A security administrator needs to implement a system that detects possible intrusions based upon a vendor
provided list. Which of the following BEST describes this type of IDS?
A security administrator needs to implement a system that detects possible intrusions based upon a vendor
provided list. Which of the following BEST describes this type of IDS?
A.
Signature based
B.
Heuristic
C.
Anomaly-based
D.
Behavior-based