You have just installed a new network-based IDS for your organization. You are in the middle of your initial configuration of the system, and are now configuring the response. What is the most common response of an IDS when an event happens?
To trace the origin of the event
To close the communication path to the hostile host
To page the security officer on call
To place an entry of the event in the log file
To reconfigure the service that is being exploited
Want to practice for EX0-106 - SCNS Tactical Perimeter Defense ?