answersLogoWhite

0


Best Answer

true

revision: False.

Why?

Along with built in checksum monitoring to identify file integrity some will also incorporate heuristic based signature which uses an algorithm to determine whether or not an alarm should be triggered.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Some HIDS use heuristic based detection which in turn uses a cipher key to determine if an alert should be triggered?
Write your answer...
Submit
Still have questions?
magnify glass
imp