_______ intrusion detection involves comparing traffic to known characteristics of malicious traffic, known as attack signatures.
_______ intrusion detection involves comparing traffic to known characteristics of malicious
traffic, known as attack signatures.
A. Pattern matching
B. Statistical anomaly
C. Behavioral analysis
D. Host
E. Network
Answer: A