27. Which of the following types of systems detects network attacks based upon how they compare with a baseline of traffic patterns that are considered normal for the network?
(A)Pattern-based
(B) Rule-based
(C) Signature-based
(D) Behavior-based
答案:登入後查看
統計: A(0), B(0), C(0), D(1), E(0) #3557269
統計: A(0), B(0), C(0), D(1), E(0) #3557269