Leeeeeci4841 Leeeeeci4841 19-12-2022 Computers and Technology contestada you have configured an nids to monitor network traffic. which of the following describes harmless traffic that has been identified as a potential attack by the nids device?