What is an advantage of the anomaly detection method?

A. makes use of signatures of well-known attacks
B. system can detect attacks from inside the network by people with stolen accounts
C. easy to understand and less difficult to configure than a signature-based system
D. after installation, the IDPS is trained for several days or weeks

Answer: B

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. Form Header II. Section bar III. Form Footer IV. Record selector bar A. prints only on last page if forms are printed as a group B. printed on the top of the first page when records are printed as forms C. gray line in a form or report that identifies and separates one section from another D. used to select an entire record in Form view

Computer Science & Information Technology

In proper database design, you should set the Required field property to Yes for ________ fields

Fill in the blank(s) with correct word

Computer Science & Information Technology