EXIN Exam Questions

this system would be an example of which of the following?

If you wanted to configure your new system to use the process of detecting unauthorized activity that matches known patterns of misuse, this system would be an example of which of the following?

A.
Intrusion

B.
Misuse

C.
Intrusion detection

D.
Misuse detection

E.
Anomaly detection