A(n) ____ WIDS analyzes the information it gathers and compares it to large databases of attack signatures.

A. baseline detection
B. anomaly detection
C. behavior detection
D. signature detection


Answer: D

Computer Science & Information Technology

You might also like to view...

Explain in detail how to animate a symbol along a path, including an explanation of the use of motion paths in your response.

What will be an ideal response?

Computer Science & Information Technology

When converting a report to a Web page, the only available option in the Export — HTML Document dialog box is to:

A) create the Web page for viewing in Internet Explorer version 5.0 or higher or Netscape version 3.0 or higher. B) open the page in a Web browser after the export is complete. C) open only the selected records. D) create the Web page for viewing in Internet Explorer version 5.0 or higher.

Computer Science & Information Technology

A left tab stop:

A) aligns the right edge of the text with the tab stop. B) centers the text around the tab stop. C) aligns the left edge of the text with the tab stop. D) aligns decimal points at the tab stop.

Computer Science & Information Technology

A VPN connection that is set to time out after 24 hours is demonstrating which model of access control?

A. Role-based access control B. Attribute-based access control C. Discretionary access control D. Mandatory access control

Computer Science & Information Technology