_________ techniques detect intrusion by observing events in the system and applying a set of rules that lead to a decision regarding whether a given pattern of activity is or is not suspicious. ?

Fill in the blank(s) with the appropriate word(s).


Rule-based

Computer Science & Information Technology

You might also like to view...

The COUNTA function will count the number of cells in a range that meet a specified condition

Indicate whether the statement is true or false.

Computer Science & Information Technology

At the center of a star network is the _____, which manages the network and acts as a communications conduit for all network traffic.

A. log B. scale C. switch D. portal

Computer Science & Information Technology

The ____ behavior displays two images - one that displays by default, and one that replaces the default image upon an event.

A. swap image B. jump image C. change image D. flip image

Computer Science & Information Technology

Natural languages are more rigid than programming languages.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology