As a security analyst, you are reviewing intrusion prevention events and you notice that all the traffic being detected is internal traffic with no signature matches. What term most likely describes this situation?
Already signed up? Sign in
Study without ads
Let's continue studying where you left off.