List of questions
Related questions
Question 41 - 112-51 discussion
Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it.
Identify the type of IDS employed by Messy in the above scenario.
A.
Signature-based
B.
Stateful protocol analysis
C.
Anomaly-based
D.
Application proxy
Your answer:
0 comments
Sorted by
Leave a comment first