CIS 333 Week 4 Quiz 7 CIS 333 Week 4 Quiz 7 | Page 2

Which of the following is the definition of anomaly-based IDS? • Question 4 Audits also often look at the current configuration of a system as a snapshot in time to verify that it complies with ________. • Question 5 A method of security testing that isn’t based directly on knowledge of a program’s architecture is the definition of ________. Question 6 Which of the following is the definition of white-box testing?