Regarding the network intrusion detection system (NIDS), which of the following statements is wrong?
A.
It is mainly used for real-time monitoring of the information of the critical path of the network, listening to all packets on the network, collecting data, and analyzing suspicious objects
B.
Use the newly received network packet as the data source;
C.
Real-time monitoring through the network adapter, and analysis of all communication services through the network;
D.
Used to monitor network traffic, and can be deployed independently.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit