Define and compare a network-based IDS (NIDS) with a host-based IDS (HIDS).

What will be an ideal response?


A NIDS includes several intrusion sensors located around the network—often on one or both sides of a gateway router. The sensors report to a central application that interprets the data to detect unusual activity. A HIDS is software that runs on individual systems, monitoring events, such as system or registry changes. A well-protected network will employ both a NIDS and a HIDS.

Computer Science & Information Technology

You might also like to view...

To add a Report header and footer to a blank report, right-click the page header and select ____ on the shortcut menu.

A. Report Titles B. Report Header/Footer C. Report Layout D. Display Options

Computer Science & Information Technology

You can add an image to the masthead by dragging it from the Folder List to the masthead div.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

__________ is a set of tools that enable you to manage resources used by files and folders on your server by performing such tasks as limiting the amount of space used by users, restricting the types of files being saved, and monitoring the amount of storage used

a. File Server Resource Manager (FSRM) b. Distributed File System (DFS) c. Data Deduplication d. Services for Network File System (NFS)

Computer Science & Information Technology

When Photoshop detects an embedded watermark, it displays the ____ image in the image file's title bar.

A. Microsoft Corporation B. copyright C. Digimarc Corporation D. United States Postal Service

Computer Science & Information Technology