Introduction to Cloud Computing - Old Questions
9. Why intrusion detection systems are implemented in cloud networks? How anamoly based intrusion detection system differs from signature based?
3+3 marks
|
Asked in 2075