Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
_____ based detection in IDS depends on vendor-provided list of patterns that are used for comparison against activities on the network.
Activity
Anomaly
Signature
User
These are signature based IDS, and the patterns are actually signatures of known attacks. They function similar to the antivirus systems. Question could be worded better since anomaly would also check for activities and compare it with its baseline as to what is "normal" traffic. This question suggested the correct answer is "Anomaly" but comparing a "list of patterns" against network activity describes a signature based IDS, not an anomaly.
Train with Skillset and pass your certification exam. Faster. Guaranteed.
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.