Can't we just use a network-based IDS to monitor the network traffic and then send the intruders a strongly worded email? That's how I handle all my cybersecurity problems.
Wait, what? Comparing network traffic to a baseline? That sounds like a lot of work. I just want to get this exam over with. Maybe I'll just go with the most tech-sounding option, anomaly-based. That's gotta be it, right?
Okay, let's think this through. Signature-based and file-based don't really fit the description, so I'm gonna go with either network-based or anomaly-based.
Hmm, this one seems tricky. I remember learning about the different types of IDS, but I'm not sure which one specifically monitors network traffic against a baseline.
Donte
1 months agoLisandra
1 months agoVirgie
6 days agoArthur
11 days agoCamellia
12 days agoLorrine
1 months agoKaty
2 days agoFranklyn
2 months agoCarissa
11 days agoEleni
27 days agoJessenia
1 months agoFiliberto
2 months agoLauna
1 days agoWhitney
3 days agoSherell
5 days agoTalia
6 days agoMaddie
6 days agoTomoko
7 days agoCyndy
8 days agoStephaine
9 days agoStevie
9 days agoWalker
12 days agoReita
13 days agoRosalyn
19 days agoGlynda
26 days agoDonette
1 months agoHoward
2 months agoRory
2 months agoBok
3 months ago