Which of the following is the definition of anomaly-based IDS?
•
Question 4
Audits also often look at the current configuration of a system as a snapshot in time to
verify that it complies with ________.
•
Question 5
A method of security testing that isn’t based directly on knowledge of a program’s
architecture is the definition of ________.
Question 6
Which of the following is the definition of white-box testing?