Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?
When no anomaly is present in an Intrusion Detection, but an alarm is generated, the response is known as __________.