__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
A) Profile based detection
B) Signature detection
C) Threshold detection
D) Anomaly detection
Correct Answer:
Verified
Q11: Intrusion detection is based on the assumption
Q18: Running a packet sniffer on a workstation
Q20: _ are either individuals or members of
Q21: A(n) _ is inserted into a network
Q22: An IDS comprises three logical components: analyzers,
Q24: The _ is the ID component that
Q25: A(n) _ event is an alert that
Q26: _ anomaly detection focuses on characterizing the
Q27: A (n) _ is a hacker with
Q28: _ simulate human brain operation with neurons
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents