Why does a stealth mode IDS need a separate network to communicate alarms and to accept management commands?
What will be an ideal response?
The stealth mode IDS does not want to appear on its monitored network. To send an alarm, the IDS would need to initiate a communication with itself as the sender.
You might also like to view...
What are the main problems a transport protocol must solve to achieve reliable transfer?
What will be an ideal response?
Microsoft PowerPoint and Apple Keynote are examples of ________ software
Fill in the blank(s) with correct word
Greenwich Mean Time (GMT) is an international time standard that is based on longitude and uses a 24-hour clock format. UTC is calculated from 0 degrees longitude, which runs through the Royal Observatory in Greenwich, England
Indicate whether the statement is true or false.
What is the common ratio for laptops today?
A. :3 B. :9 C. :11 D. :4