What technology is being used to detect anomalies?
What technology is being used to detect anomalies?
IDSs verify, itemize, and characterize threats from:
IDSs verify, itemize, and characterize threats from:
what fundamental functional components?
IDS can be described in terms of what fundamental functional components?
What are the primary goals of intrusion detection systems?
What are the primary goals of intrusion detection systems? (Select all that apply.)
What is the most common way to classify IDSs?
What is the most common way to classify IDSs?
The majority of commercial intrusion detection systems are:
The majority of commercial intrusion detection systems are:
Which of the following is a drawback of Network-based IDSs?
Which of the following is a drawback of Network-based IDSs?
which of the following sources?
Host-based IDSs normally utilize information from which of the following sources?
which of the following is an obvious advantage?
When comparing host based IDS with network based ID, which of the following is an obvious
advantage?
Which of the following will you consider as an obvious disadvantage of host based IDS?
You are comparing host based IDS with network based ID. Which of the following will you consider
as an obvious disadvantage of host based IDS?