A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?

A. Behavior based IDS
B. Network based IDS
C. Signature based IDS
D. Honeypot

Answer: C. Signature based IDS

Computer Science & Information Technology

You might also like to view...

A movable, resizable container where text or graphics can be placed is called a

A) text box. B) chart area. C) plot area. D) bevel.

Computer Science & Information Technology

Unicode is limited to only the Latin alphabet used with the English language.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology