Suggested Answer:A🗳️
Source: KRUTZ, Ronald L. & VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley & Sons, Page 49.
A. signature-based IDS
Attributes that characterize an attack are typically stored for reference in a signature-based Intrusion Detection System (IDS). In signature-based IDS, known attack patterns or signatures are stored in a database, and the IDS compares incoming network traffic or system activity against these signatures. If there is a match between the observed activity and a stored signature, the IDS raises an alert or takes action to mitigate the threat.
Signature-based IDS is effective at detecting known and well-defined attacks but may struggle with detecting new or previously unseen attacks
upvoted 1 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Stevovo123
6 months, 1 week ago