Short Answer
_______________ detection looks for things that are out of the ordinary,such as a user logging in when he's not supposed to,or unusually high network traffic into and out of a workstation.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q12: Simple rule sets that are applied to
Q13: Which of the following is NOT a
Q14: A new breed of IDS that is
Q15: The NIDS signature database is usually much
Q16: List three approaches that antispam software uses
Q18: _ signatures are designed to match large
Q19: How does stateful packet filtering differ from
Q20: The model that most modern intrusion detection
Q21: A(n)_ is an artificial environment where attackers
Q22: A(n)_ monitors network traffic for malicious or