_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
A.
Pattern matching
B.
Statistical anomaly
C.
Behavioral analysis
D.
Host
E.
Network
_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
A.
Pattern matching
B.
Statistical anomaly
C.
Behavioral analysis
D.
Host
E.
Network
a