Q: 3
Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their
corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS
solution that first creates models for possible intrusions and then compares these models with
incoming events to make detection decisions.
Identify the detection method employed by the IDS solution in the above scenario.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.