EXIN Exam Questions

which of the following?

If you wanted to configure your new system to use the process of detecting unauthorized activity
that matches known patterns of misuse, this system would be an example of which of the
following?

A.
Intrusion

B.
Misuse

C.
Intrusion detection

D.
Misuse detection

E.
Anomaly detection