After a meeting between the IT department leaders and a security consultant, they decide to implement a new IDS in your network.
You are later asked to explain to your team the type of IDS that is going to be implemented. Which of the following best describes the
centralized design of a Host-Based IDS?
Currently there are no comments in this discussion, be the first to comment!