A security administrator needs to implement
a system that detects possible intrusions based upon a vendor provided list.
Which of the following BEST describes this type of IDS?
A. Signature based
B. Heuristic
C. Anomaly-based
D. Behavior-based
A security administrator needs to implement
a system that detects possible intrusions based upon a vendor provided list.
Which of the following BEST describes this type of IDS?
A. Signature based
B. Heuristic
C. Anomaly-based
D. Behavior-based