Which of the following would be the BEST solution for an IDS to monitor known attacks?
A. Host-based
B. Signature-based
C. Network-based
D. Behavior-based
Which of the following would be the BEST solution for an IDS to monitor known attacks?
A. Host-based
B. Signature-based
C. Network-based
D. Behavior-based