Identify the technique used by Intrusion Detection Systems to analyze network packets and match them against known attack patterns or signatures.
Anomaly-based Detection
Signature-based Detection
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Information Technology and Cybersecurity Exercises are loading ...