The disadvantage of a host-based intrusion detection system (HIDS) is that it
a. can analyze any encrypted data if it is decrypted before reaching the target host.
b. consumes resources on the host it resides on and slows that device down.
c. monitors log files for inadvisable settings or passwords.
d. monitors traffic on the host on which it is installed.
Ans: b. consumes resources on the host it resides on and slows that device down.
You might also like to view...
What is the difference between the set point and the current process variable value called?
A) Error B) Excess C) Oversight D) Set point
During metamorphosis, tick larvae change into ____________________
Fill in the blank(s) with correct word
Which of the following is an example of forced convection?
A) A ceiling fan forcing warm air down B) Heat traveling along a metal rod C) Air moving in a refrigerator D) A radiant heater placed in a room
Technician A says that disc brake pads should be replaced when worn to minimal allowable thickness. Technician B says the pads should be removed and inspected whenever there is a brake performance complaint. Which technician is correct?
A) Technician A only B) Technician B only C) Both technicians D) Neither technician