EXIN Exam Questions

what is this known as?

As Intrusion Detection Systems become more sophisticated, the software manufacturers develop
different methods of detection. If an IDS uses the process of matching known attacks against data
collected in your network, what is this known as?

A.
Signature analysis

B.
Packet filter matching

C.
Statistical analysis

D.
Analysis engine engagement

E.
Packet match and alarming