ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 32 Topic 4 Discussion

ECCouncil Certified Cybersecurity Technician (CCT) 212-82 Question # 32 Topic 4 Discussion

212-82 Exam Topic 4 Question 32 Discussion:
Question #: 32
Topic #: 4

Rhett, a security professional at an organization, was instructed to deploy an IDS solution on their corporate network to defend against evolving threats. For this purpose, Rhett selected an IDS solution that first creates models for possible intrusions and then compares these models with incoming events to make detection decisions.

Identify the detection method employed by the IDS solution in the above scenario.


A.

Not-use detection


B.

Protocol anomaly detection


C.

Anomaly detection


D.

Signature recognition


Get Premium 212-82 Questions

Contribute your Thoughts:


Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.