Question 258:
A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list. Which of the following BEST describes this type of IDS?
Answer options:
A. Signature based B. Heuristic C. Anomaly-based D. Behavior-based