Question: John has implemented an intrusion detection system that has identified suspicious traffic without the use of signatures. While responding to the event, John notices that
John has implemented an intrusion detection system that has identified suspicious traffic without the use of signatures. While responding to the event, John notices that the IDS has falsely identified the traffic as being suspicious. Which of the following devices does John need to configure to prevent additional false alarms?
Question options:
Signaturebased IDS
Anomalybased IDS
Anomalybased IPS
Hostbased IDS
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
