False alarms in an IDS are known as ________.

A. true negatives
B. false positives
C. true positives
D. false negatives


B. false positives

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Networking professionals need to seize opportunities for both in-house and third-party training to maintain their competitive edge. 2. Develops is said to be the intersection of software engineering, quality assurance, and operations. 3. ALM embraces requirements management, system design, software development, and configuration management and implies an integrated set of tools for developing and controlling the project. 4. The Develops approach is just for applications and does not pertain to network infrastructure. 5. Technical and management literature on SDN, NFV, cloud, and IoT shows a frequent reference to the need for personnel who understand and can use a Develops approach to deigning, installing, and managing these new network technologies.

Computer Science & Information Technology

An operational audit looks for accounts that have weak or blank passwords.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

____ mode is a good option if you use your computer intermittently throughout the day.

A. Hybrid sleep B. Safe C. Sleep D. Hibernate

Computer Science & Information Technology

When you use your computer to view webpages, you are browsing or surfing the web

Indicate whether the statement is true or false

Computer Science & Information Technology