The disadvantage of a host-based intrusion detection system (HIDS) is that it

a. can analyze any encrypted data if it is decrypted before reaching the target host.
b. consumes resources on the host it resides on and slows that device down.
c. monitors log files for inadvisable settings or passwords.
d. monitors traffic on the host on which it is installed.


Ans: b. consumes resources on the host it resides on and slows that device down.

Trades & Technology

You might also like to view...

What is the difference between the set point and the current process variable value called?

A) Error B) Excess C) Oversight D) Set point

Trades & Technology

During metamorphosis, tick larvae change into ____________________

Fill in the blank(s) with correct word

Trades & Technology

Which of the following is an example of forced convection?

A) A ceiling fan forcing warm air down B) Heat traveling along a metal rod C) Air moving in a refrigerator D) A radiant heater placed in a room

Trades & Technology

Technician A says that disc brake pads should be replaced when worn to minimal allowable thickness. Technician B says the pads should be removed and inspected whenever there is a brake performance complaint. Which technician is correct?

A) Technician A only B) Technician B only C) Both technicians D) Neither technician

Trades & Technology