Your company has an intrusion detection system (IDS) monitoring traffic between the Internet and the company's internal network. The IDS logged an attack attempt from a remote IP address. Two months later, the attacker successfully compromised the network. Which of the following MOST likely occurred?

A. The IDS generated too many false negatives.
B. No one was reviewing the IDS event logs.
C. The IDS generated too many false positives.
D. The attack occurred during off hours or a holiday.


B
Explanation: It is most likely that no one was reviewing the IDS event logs. If those logs were reviewed on a regular basis, someone would have noticed the attack attempt and would have taken measures to prevent the attack in the future.
This problem was not because the IDS generated too many false negatives or false positives. False positives or false alarms occur when an IDS incorrectly identifies certain traffic as an attack attempt. False positives occur when an IDS incorrectly identifies certain traffic as normal or acceptable. If an IDS returns false positives or false negatives, the IDS administrator can take actions that will allow the IDS to correctly identify that traffic in the future. However, this would not have caused the problem in the scenario.
If the attack occurred during off hours or a holiday, the attack would still have been prevented if the appropriate measures were taken to prevent the attack after the initial attack attempt occurred.

Computer Science & Information Technology

You might also like to view...

Write the function declaration for an assignment operator for a class named myClass

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following can be used as a source for a binding properties?

a. Integer b. Double c. IntegerProperty d. DoubleProperty e. String

Computer Science & Information Technology

You cannot select multiple values when filtering a PivotTable report using a report filter.? ____________________ ?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

A challenge with using social media data in court is authenticating the author and the information.

Computer Science & Information Technology