Which of the following would be the BEST solution for an IDS to monitor known attacks?

A. Host-based
B. Signature-based
C. Network-based
D. Behavior-based

Answer: B. Signature-based

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. live preview II. drag-and-drop III. paste IV. cut V. wordwrap A. words within a paragraph automatically move to the next line B. shows result of formatting changes on selected text prior to applying C. add text or object to a new location D. text or object removed from its current location E. moving selected text with the mouse

Computer Science & Information Technology

Pressing [Ctrl]+[Home] will make the first cell in the current row active

Indicate whether the statement is true or false

Computer Science & Information Technology