Which of the following terms refers to the raw information that an IDS uses to detect suspicious activity?
A) Notification
B) Data source
C) Sensor
D) Activity
B) Data source
Computer Science & Information Technology
You might also like to view...
Which of the following tools is best suited to complete repetitive tasks in Excel?
A) Macros B) Themes C) Styles D) Templates
Computer Science & Information Technology
All desktops provide support for ECC and should be enabled or disabled through the system BIOS/UEFI
Indicate whether the statement is true or false
Computer Science & Information Technology