Which of the following terms refers to the raw information that an IDS uses to detect suspicious activity?

A) Notification
B) Data source
C) Sensor
D) Activity

B) Data source

Computer Science & Information Technology

You might also like to view...

Which of the following tools is best suited to complete repetitive tasks in Excel?

A) Macros B) Themes C) Styles D) Templates

Computer Science & Information Technology

All desktops provide support for ECC and should be enabled or disabled through the system BIOS/UEFI

Indicate whether the statement is true or false

Computer Science & Information Technology