Alarm filtering may be based on combinations of frequency, the similarity in attack signature, the similarity in attack target, or other criteria that are defined by the system administrators. True or False?