Can't we just use a network-based IDS to monitor the network traffic and then send the intruders a strongly worded email? That's how I handle all my cybersecurity problems.
Wait, what? Comparing network traffic to a baseline? That sounds like a lot of work. I just want to get this exam over with. Maybe I'll just go with the most tech-sounding option, anomaly-based. That's gotta be it, right?
Okay, let's think this through. Signature-based and file-based don't really fit the description, so I'm gonna go with either network-based or anomaly-based.
Hmm, this one seems tricky. I remember learning about the different types of IDS, but I'm not sure which one specifically monitors network traffic against a baseline.
Donte
1 months agoLisandra
1 months agoVirgie
4 days agoArthur
9 days agoCamellia
10 days agoLorrine
1 months agoFranklyn
2 months agoCarissa
9 days agoEleni
25 days agoJessenia
1 months agoFiliberto
2 months agoWhitney
1 days agoSherell
3 days agoTalia
4 days agoMaddie
4 days agoTomoko
5 days agoCyndy
6 days agoStephaine
7 days agoStevie
7 days agoWalker
10 days agoReita
11 days agoRosalyn
17 days agoGlynda
24 days agoDonette
1 months agoHoward
2 months agoRory
2 months agoBok
3 months ago