During a routine vulnerability assessment of the network, an analyst receives a notification of potential malicious traffic that, upon further investigation, turns out to be legitimate and normal network activity. What does this notification exemplify?
A false negative
A false positive
An intrusion attempt
A true positive