Multiple Choice
_________ involves the collection of data relating to the behavior of legitimate users over a period of time.
A) Profile based detection
B) Signature detection
C) Threshold detection
D) Anomaly detection
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: An inline sensor monitors a copy of
Q3: Snort can perform intrusion prevention but not
Q4: _ is a security service that monitors
Q5: Those who hack into computers do so
Q6: Signature-based approaches attempt to define normal, or
Q8: A _ monitors the characteristics of a
Q9: Intruders typically use steps from a common
Q10: _ are decoy systems that are designed
Q11: The primary purpose of an IDS is
Q24: Intrusion detection is based on the assumption