Which of the following security appliances would be used to only analyze traffic and send alerts when predefined patterns of unauthorized traffic are detected on the network?

A. Host based IPS
B. Network based firewall
C. Signature based IDS
D. Behavior based IPS


Answer: C. Signature based IDS

Computer Science & Information Technology

You might also like to view...

You can modify the locations included in a library, but the location must be indexed by which of the following?

A. File Explorer B. Libraries C. Windows Search D. Documents

Computer Science & Information Technology

Field types in an OpenOffice Base database are defined in Design View of a table

Indicate whether the statement is true or false

Computer Science & Information Technology

Private corporate internal networks are called ____.

A. intranets B. internets C. extranets D. corpnets

Computer Science & Information Technology

Another name for event logging is

A) Authentication B) Authorization C) Encryption D) None of these are names for event logging.

Computer Science & Information Technology