Multiple Choice
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
A) Profile based detection
B) Signature detection
C) Threshold detection
D) Anomaly detection
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q16: The IDS component responsible for collecting data
Q17: _ is a document that describes the
Q18: The _ module analyzes LAN traffic and
Q19: An intruder can also be referred to
Q20: A(n) _ is inserted into a network
Q22: A(n) _ event is an alert that
Q23: The _ is responsible for determining if
Q24: To be of practical use an IDS
Q25: A _ IDS monitors traffic at selected
Q26: Copying a database containing credit card numbers,