Question: Which method is used by anomaly - based IDPS to detect intrusions? Group of answer choices Encrypting all data transfers on the network Comparing current
Which method is used by anomalybased IDPS to detect intrusions?
Group of answer choices
Encrypting all data transfers on the network
Comparing current network activity to a baseline of normal activity
Blocking all traffic from external sources
Comparing user behavior to a database of known attack patterns
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
