Which of the following would be the BEST solution for an IDS to monitor known attacks?
A. Host-based
B. Signature-based
C. Network-based
D. Behavior-based
Answer: B. Signature-based
Computer Science & Information Technology
You might also like to view...
After you've finished formatting a worksheet cell, click inside the cell to complete the process.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When objects are copied from one file to another, the file to which the item is copied is the ________ file
Fill in the blank(s) with correct word
Computer Science & Information Technology
Using IPv4, a typical _______________ on the Internet has between 30,000 and 50,000 routes.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
When working with a sequential access file, you can jump directly to any piece of data in the file without reading the data that comes before it.
a. true b. false
Computer Science & Information Technology