A security technician is concerned there4 is not enough security staff available the web servers and database server located in the DMZ around the clock. Which of the following technologies, when deployed, would provide the BEST round the clock automated protection?
A. HIPS & SIEM
B. NIPS & HIDS
C. HIDS& SIEM
D. NIPS&HIPS
Answer: B. NIPS & HIDS
Computer Science & Information Technology
You might also like to view...
A function that is associated with an individual object is called __________.
a. a static function b. a class function c. an object function d. an instance function
Computer Science & Information Technology
Which of the following domains is used by for-profit businesses?
A) .com B) .edu C) .mil D) .net E) .org
Computer Science & Information Technology
An applet has no constructor or main() method.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Compute a two-level decision tree using the greedy approach described in this chapter. Use the classification error rate as the criterion for splitting. What is the overall error rate of the induced tree?
Consider the following set of training examples.
Computer Science & Information Technology