Network+ Pop Quiz: You can’t hear me over over how awesome my shirt isHow does anomaly-based intrusion prevention work? Malicious traffic is identified based on the behavior of the end-station An alarm is triggered if the traffic exceeds the baseline of what's normal Artificial intelligence is used to identify any intrusions An exact signature is matched to the network traffic My Hawaiian shirt may be a bit too loud for our alarm systems