List five strengths of IDPSs.
What will be an ideal response?
IDPSs perform the following functions well:
· Monitoring and analysis of system events and user behaviors
· Testing the security states of system configurations
· Baselining the security state of a system, then tracking any changes to that baseline
· Recognizing patterns of system events that correspond to known attacks
· Recognizing patterns of activity that statistically vary from normal activity
· Managing operating system audit and logging mechanisms and the data they generate
· Alerting appropriate staff by appropriate means when attacks are detected
· Measuring enforcement of security policies encoded in the analysis engine
· Providing default information security policies
· Allowing non-security experts to perform important security monitoring functions
You might also like to view...
The protection of the information that might be derived from observation of traffic flows is _________ .
A) connectionless confidentiality B) connection confidentiality C) traffic- flow confidentiality D) selective- field confidentiality
When printing a form that uses tab control for printing, the screens displaying the data are copied into WordPad and then printed
Indicate whether the statement is true or false
What happens if you click the Gridlines check box to deselect it?
A. The gridlines rotate B. The gridlines become dim C. The gridlines become bold D. The gridlines disappear
A field whose data type is ____ can store an OLE object, which is an object linked to or embedded in the table.
A. Picture B. Image C. OLE Object D. Bitmap