Which of the following terms refers to the raw information that an IDS uses to detect suspicious activity?

A) Notification
B) Data source
C) Sensor
D) Activity


B) Data source

Computer Science & Information Technology

You might also like to view...

Visual Basic 2017 provides a starter ____________________ to assist you in designing a webpage.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A frame that houses the system unit on a desktop is called a(n) ______.

A. briefcase B. tower C. sleeve D. canister

Computer Science & Information Technology

Describe how encryption is implemented at various layers of the OSI model.

What will be an ideal response?

Computer Science & Information Technology

Use a sheet of graph paper to draw a sketch of the exponential function with the assistance of a graphing calculator. Then, find the value of f(2) for the function.

What will be an ideal response?

Computer Science & Information Technology