The majority of commercial intrusion detection systems are:
The majority of commercial intrusion detection systems are:
Which of the following is a drawback of Network-based IDSs?
Which of the following is a drawback of Network-based IDSs?
which of the following sources?
Host-based IDSs normally utilize information from which of the following sources?
which of the following is an obvious advantage?
When comparing host based IDS with network based ID, which of the following is an obvious
advantage?
Which of the following will you consider as an obvious disadvantage of host based IDS?
You are comparing host based IDS with network based ID. Which of the following will you consider
as an obvious disadvantage of host based IDS?
Which of the following IDS inflict a higher performance cost on the monitored systems?
Which of the following IDS inflict a higher performance cost on the monitored systems?
which of the following sources?
Application-based IDSs normally utilize information from which of the following sources?
Which of the following are the major categories of IDSs response options?
Which of the following are the major categories of IDSs response options?
The most common form of alarm is:
Alarms and notifications are generated by IDSs to inform users when attacks are detected. The
most common form of alarm is:
Which of the following is a valid tool that complements IDSs?
Which of the following is a valid tool that complements IDSs?