In a WIDS anomaly detection system the security administrator defines the ____ (or normal) state of the network's traffic.

A. baseline
B. signature
C. pattern
D. false positives


Answer: A

Computer Science & Information Technology

You might also like to view...

USB flash drives use ____________________ storage technology, which provides fast access to data, and holds data even when not connected to a power source.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In the accompanying figure, item 3 is the frame that represents the ____.

A. border of the frame B. border of the mask C. border of the graphic D. border of box

Computer Science & Information Technology

Special software is not required to include electronic postage when creating envelopes

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is a program or set of instructions in a program that allows users to bypass security controls?

A. keygens B. indices C. rootkit D. back door

Computer Science & Information Technology