A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?
A. Behavior based IDS
B. Network based IDS
C. Signature based IDS
D. Honeypot
Answer: C. Signature based IDS
Computer Science & Information Technology
You might also like to view...
A movable, resizable container where text or graphics can be placed is called a
A) text box. B) chart area. C) plot area. D) bevel.
Computer Science & Information Technology
Unicode is limited to only the Latin alphabet used with the English language.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology