A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list.Which of the following BEST describes this type of IDS?

A. Signature based
B. Heuristic
C. Anomaly-based
D. Behavior-based

Answer: A. Signature based

Computer Science & Information Technology

You might also like to view...

The table or query that supplies the underlying data for a form or report is called the ________ or data source

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following replaces the destination IP address of a packet?

A. NAT B. DNS C. SNAT D. DHCP

Computer Science & Information Technology