I bet the answer is A) Application protocol-based intrusion detection system (APIDS). It's designed to detect issues with application-lDevorahl protocols, which could include user anomalies.
This is a tricky one, but I'm going to go with C) Network intrusion detection system (NIDS). It seems the most likely to catch abnormal user behavior on the network.
D) Host-based intrusion detection system (HIDS) seems more likely to me. HIDS monitors the behavior of individual hosts and can identify unusual activity.
I think the answer is C) Network intrusion detection system (NIDS). NIDS monitors network traffic and can detect anomalies that may indicate an attack.
William
2 months agoRodolfo
2 months agoDevorah
2 months agoLawanda
29 days agoSarah
1 months agoAshton
2 months agoCatarina
2 months agoClare
20 days agoTu
1 months agoRenay
1 months agoChantell
1 months agoHerman
2 months agoJoni
1 months agoCatarina
1 months agoAleisha
2 months agoShawnna
2 months agoIzetta
1 months agoGoldie
1 months agoDaren
2 months agoCecily
3 months agoCarmen
3 months agoDella
3 months ago