What type of NIDS commonly uses artificial intelligence and data mining to identify malicious network traffic?

  • Anomaly-based NIDS
  • Signature-based NIDS
  • Rule-based NIDS
  • Filter-based NIDS

Your Score:
Threats, Attacks and Vulnerabilities
Technologies and Tools
Architecture and Design
Identity and Access Management
Risk Management
Cryptography and PKI
CompTIA Security+ SY0-501
  • Threats, Attacks and Vulnerabilities
  • Technologies and Tools
    • This question is filed here
  • Architecture and Design
  • Identity and Access Management
  • Risk Management
  • Cryptography and PKI