Register
4:58
Stop
CISSP - Personnel Security - Non-Disclosure and Confidentiality Agreements
Beginner
1/5
An organization's network intrusion detection system (NIDS) is updated to include heuristic analysis capabilities. Why would this be beneficial in supplementing the existing signature-based detection?
a.
It minimizes resource utilization by only analyzing traffic from untrusted external sources.
b.
It restricts detection to previously encountered threat signatures for improved accuracy.
c.
It relies solely on known threat signatures to ensure high-speed detection of intrusions.
d.
It enhances detection of novel threats by identifying unusual behavior patterns.
Beginner