Malicious Traffic
What is the primary purpose of an Intrusion Detection System (IDS)?
Which of the following best describes a brute force attack?
How does Snort identify a potential SSH brute force attack?