DRAG DROP -Drag and drop the security concept on the left onto the example of that concept on the right.Select and Place:
What is the difference between statistical detection and rule-based detection models?
What is the difference between a threat and a risk?
Which attack method intercepts traffic on a switched network?
What does an attacker use to determine which network ports are listening on a potential target device?
Which event is user interaction?