Which of the following is true about the steps in setting up and using an IDPS?
A. anomaly-based systems come with a database of attack signatures
B. sensors placed on network segments will always capture every packet
C. alerts are sent when a packet doesn't match a stored signature
D. false positives do not compromise network security
Answer: D
You might also like to view...
Left-clicking the ____ tab in the Direct Cable Connection allows you to switch between Guest mode and Host mode.
A. Change B. Properties C. Alter D. Interface
In a query, you can group the data by the values within one of the columns. ?
Answer the following statement true (T) or false (F)
Which of the following is not one of the functions of a digital signature?
A. verification of the sender B. prevention of the sender from disowning the message C. prove the integrity of the message D. protect the public key
While performing routine testing of a hot standby site located at a remote hosting center, a system administrator is unable to access one of the server operating systems to verify functionality. Which of the following is MOST applicable to access the host?
A. KVM over IP B. RDP over HTTP C. Secure shell D. Serial console access E. VNC