Which of the following would be the BEST solution for an IDS to monitor known attacks?

A. Host-based
B. Signature-based
C. Network-based
D. Behavior-based


Answer: B. Signature-based

Computer Science & Information Technology

You might also like to view...

After you've finished formatting a worksheet cell, click inside the cell to complete the process.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When objects are copied from one file to another, the file to which the item is copied is the ________ file

Fill in the blank(s) with correct word

Computer Science & Information Technology

Using IPv4, a typical _______________ on the Internet has between 30,000 and 50,000 routes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When working with a sequential access file, you can jump directly to any piece of data in the file without reading the data that comes before it.

a. true b. false

Computer Science & Information Technology