List of questions
Related questions
Question 55 - 101 discussion
The use of attack signature within an intrusion Detection System (IDS) is an application of which security model?
A.
Positive
B.
Context-based
C.
Negative
D.
Role-based
Your answer:
0 comments
Sorted by
Leave a comment first