What is an advantage of the anomaly detection method?

A. makes use of signatures of well-known attacks
B. system can detect attacks from inside the network by people with stolen accounts
C. easy to understand and less difficult to configure than a signature-based system
D. after installation, the IDPS is trained for several days or weeks


Answer: B

Computer Science & Information Technology

You might also like to view...

Shortcut menus are context sensitive where the choices listed in the menu depend on where you click in your document

Indicate whether the statement is true or false

Computer Science & Information Technology

Which command is used to resave frequently used text and then insert the saved text as needed in other documents?

A. Bookmark B. Template C. Text box D. Quick Parts

Computer Science & Information Technology

Match each item with a statement below:

A. Ethernet contention method B. a sudden rush of network transmissions that causes all other network communications to slow down due to the volume of data competing for access to the same bandwidth on the communications medium C. the length of time that is required to forward, send, or otherwise propagate a data frame D. limits collision domains to five segments of wire, four repeaters and/or hubs, and three populated hubs between any two stations on a 10-Mbps network E. a frame with an FCS error and an octet missing F. segments a network by filtering traffic at the Data Link layer G. switches that require all attached network interface devices to use the same transmit/receive speed H. also known as error sensing I. virtual local area network that allows you to logically segment a network

Computer Science & Information Technology

Android introduced fragments in Android 3.2, API level 13, primarily to support more dynamic and flexible user interface design on which feature?

A. smartphone screens B. large screens C. small screens D. touch screens

Computer Science & Information Technology