In deploying an IPS in a corporate network, system operators first create a profile of normal network operation by monitoring network activities in normal network uses. After the profile is incorporated into the IPS triggering mechanism, alarms will be generated when the IPS detects excessive activity that is beyond the scope of the profile. Which signature detection mechanism is deployed?
- pattern-based detection
- policy-based detection
- honey pot-based detection
- anomaly-based detection
Exam with this question: CCNA Security Final Exam (CCNAS v1.2)
Please login or Register to submit your answer