Which technique of an intrusion detection and prevention system relies on a database that contains known attack patterns, and scans events against it?

Which technique of an intrusion detection and prevention system relies on a database that contains known attack patterns, and scans events against it?
A . Signature-based detection
B . Anomaly-based detection
C . Device-based detection
D . Plug-in-based detection

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments