Which of the following is a key characteristic of a signature-based IDS?
Detects known patterns of malicious activity
Monitors system logs for signs of compromise
Inspects network traffic for suspicious patterns
Uses machine learning to adapt to new threats

Cloud Security Exercises are loading ...