ECCouncil Exam Questions

Which of the following systems helps to detect the "abuse of privileges" attack that does

Which of the following systems helps to detect the “abuse of privileges” attack that does not
actually involve exploiting any security vulnerability?

A.
Signature-Based ID system

B.
Network-Based ID system

C.
Statistical Anomaly-Based ID system

D.
Host-Based ID system

Explanation: