Which of the following behaviors does not belong to the scope of intrusion detection?

The content of intrusion detection covers all kinds of authorized and unauthorized intrusion behaviors. Which of the following behaviors does not belong to the scope of intrusion detection?
A. Impersonate another user
B. The administrator deletes the configuration by mistake
C. Planting worm Trojans
D. leak data

Download Printable PDF. VALID exam to help you PASS.

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.