Can't we just use a network-based IDS to monitor the network traffic and then send the intruders a strongly worded email? That's how I handle all my cybersecurity problems.
Wait, what? Comparing network traffic to a baseline? That sounds like a lot of work. I just want to get this exam over with. Maybe I'll just go with the most tech-sounding option, anomaly-based. That's gotta be it, right?
Okay, let's think this through. Signature-based and file-based don't really fit the description, so I'm gonna go with either network-based or anomaly-based.
Hmm, this one seems tricky. I remember learning about the different types of IDS, but I'm not sure which one specifically monitors network traffic against a baseline.
Donte
3 months agoLisandra
3 months agoSalley
1 months agoVirgie
2 months agoArthur
2 months agoCamellia
2 months agoLorrine
3 months agoRonald
1 months agoReuben
1 months agoKaty
2 months agoFranklyn
3 months agoCarissa
2 months agoEleni
3 months agoJessenia
3 months agoFiliberto
4 months agoLauna
2 months agoWhitney
2 months agoSherell
2 months agoTalia
2 months agoMaddie
2 months agoTomoko
2 months agoCyndy
2 months agoStephaine
2 months agoStevie
2 months agoWalker
2 months agoReita
2 months agoRosalyn
2 months agoGlynda
2 months agoDonette
3 months agoHoward
4 months agoRory
4 months agoBok
4 months ago