A security administrator needs to implement a system that detects possible intrusions based upon a vendor provided list.Which of the following BEST describes this type of IDS?

A. Signature based
B. Heuristic
C. Anomaly-based
D. Behavior-based


Answer: A. Signature based

Computer Science & Information Technology

You might also like to view...

In the Azure Pricing Calculator, virtual machine usage is described per which of the following cost bases?

A) Per hour, calculated to display the monthly charge B) Per minute, calculated to display the monthly charge C) Per CPU cycle, multiplied with real-time memory usage D) Per storage size and usage per gigabyte

Computer Science & Information Technology

Which of the following is NOT a question to ask yourself prior to implementing a database?

A) How many people will be using the database? B) Should the tables for the database be stored in a centralized location? C) Do all users have Access installed on their PC? D) How will the database itself be accessed?

Computer Science & Information Technology

The Slide Show view command called Screen ____.

A. can display a black or white screen B. can switch to another open program C. either a. or b. D. neither a. nor b.

Computer Science & Information Technology

A ____ provides the rules and expectations and the consequences of not following the rules.

A. password policy B. software policy C. security policy D. network policy

Computer Science & Information Technology