Which intrusion detection system (IDS) contains information about specific attacks and system vulnerabilities?
a. Knowledge-based IDS
b. Behavior-based IDS
c. Threat-based IDS
d. Risk-based IDS
a. Knowledge-based IDS
Knowledge-based approaches and behavior-based approaches are two fundamentally different approaches to intrusion detection. Knowledge-based intrusion detection systems contain information about specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities, such as repeated failed login attempts or recurring attempts to download a program to a server.When such an attempt is detected, an alarm is triggered.
You might also like to view...
Whenever possible, you should supplement your server-side validation with ______ validation to reduce the workload on the server.
Fill in the blank(s) with the appropriate word(s).
What other types of forms would be helpful for CCIB to create in their database? What other types of reports could they use?
What will be an ideal response?
A cell with a comment is indicated by ________
A) bolding the cell text B) a red cell background C) italicizing the cell text D) a red triangle in the top-right corner of the cell
COGNITIVE ASSESSMENT Which of the following is NOT a suggestion for easing eyestrain while using a mobile device?
A. Position the display about 90 degrees below eye level. B. Clean the screen regularly. C. Blink your eyes every five seconds. D. Take an eye break every 30 minutes.