Which of the following is NOT a detection technique used by an Intrusion Detection System (IDS)?
Signature-based
Port scanning
Heuristic-based
Anomaly-based

Security Operations Exercises are loading ...