A(n) ____________________ IDS watches for suspicious behavior on systems, thus it is a behavior based IDS.
Fill in the blank(s) with the appropriate word(s).
host based
You might also like to view...
What is the library function that finds the absolute value of an integer?
What will be an ideal response?
If your firewall allowed only the machine with the IP address 192.168.1.1 to send email outside the network, how would you instruct the local copy of sendmail to use this server as a relay?
What will be an ideal response?
If you have a field named Sales and wanted to know which salespersons sold in excess of five thousand dollars, in the Criteria box under Sales, you would type >________
A) $5000 B) 5,000 C) $5,000 D) 5000
Which of the following is a scenario in which an IT support technician would most likely be required to implement the alternate IP configuration method on a network host?
A. To ensure a workstation receives the same IP address from the DHCP server each time the workstation is booted. B. In the event a DHCP server is unavailable, the workstation will have a valid IP address on the subnet. C. When a workstation requires that more than two different DNS server IP addresses be configured for a specific network interface. D. To assign a secondary DNS server IP address to a specific network interface on the workstation.