PdfPrep.com

The content of intrusion detection covers authorized and unauthorized intrusions. Which of the following is not in the scope of intrusion detection?

The content of intrusion detection covers authorized and unauthorized intrusions. Which of the following is not in the scope of intrusion detection?
A . Pretending to be another user
B . Administrator mistakenly delete configuration
C . Planting worms and Trojans
D . Leaking data information

Answer: B

Exit mobile version