ISC SSCP Question Answer
Which of the following Intrusion Detection Systems (IDS) uses a database of attacks, known system vulnerabilities, monitoring current attempts to exploit those vulnerabilities, and then triggers an alarm if an attempt is found?
ISC SSCP Summary
- Vendor: ISC
- Product: SSCP
- Update on: Jul 25, 2025
- Questions: 1074