Which of the following is the definition of pattern-based IDS?
•
Question 14
________ gives you the opportunity to review your risk-management program and to
confirm that the program has correctly identified and reduced (or otherwise addressed) the
risks to your organization.
•
Question 15
What term is used to describe a reconnaissance technique that enables an attacker to
use port mapping to learn which operating system and version are running on a computer?
•
Question 16