One form of IDS starts operation by generating an alert for every action. Over time, the administrator adjusts the setting of the IDS so that common, benign activities do not generate alarms. What are the advantages and disadvantages of this design for an IDS?

What will be an ideal response?


Pro: Adjusts to characteristics of monitored network.

Con: The tuning process can be painful and time consuming.

Computer Science & Information Technology

You might also like to view...

Pressing [tab] in the last cell of a row moves the insertion point to the previous cell in the same row.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

To create a chart, you click the Insert Chart button in a content placeholder or use the Chart button in the Illustrations group on the _____ tab.

A. Design B. Home C. Insert D. Format

Computer Science & Information Technology

________ provide additional information and request user input.

A. Ribbons B. Windows C. Toolbars D. Dialog boxes

Computer Science & Information Technology

Which function in an organization plans for information resources?

A) Data administration B) Database administration C) Knowledge Management D) Information Management

Computer Science & Information Technology