A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list.Which of the following BEST describes this type of IDS?
A. Signature based
B. Heuristic
C. Anomaly-based
D. Behavior-based
Answer: A. Signature based
Computer Science & Information Technology
You might also like to view...
The table or query that supplies the underlying data for a form or report is called the ________ or data source
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following replaces the destination IP address of a packet?
A. NAT B. DNS C. SNAT D. DHCP
Computer Science & Information Technology