__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.

A. Profile based detection B. Signature detection

C. Threshold detection D. Anomaly detection


B. Signature detection

Computer Science & Information Technology

You might also like to view...

The ____ value of the use attribute means that the attribute cannot be used with the element.

A. forbid B. preclude C. prohibited D. excluded

Computer Science & Information Technology

The smaller orange handles of a control in Design View are called the ________ handle

Fill in the blank(s) with correct word

Computer Science & Information Technology

A program consists of subprograms, called ____________________, that are designed and developed to perform a specific task.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The underlined word in the following sentence is punctuated correctly. We left at 7:15 this morning and arrived just before dark.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology