Answer the following statements true (T) or false (F)
1. The IDS component responsible for collecting data is the user interface.
2. Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.
3. The primary purpose of an IDS is to detect intrusions, log suspicious
events, and send alerts.
4. Signature-based approaches attempt to define normal, or expected,
behavior, whereas anomaly approaches attempt to define proper behavior.
5. Anomaly detection is effective against misfeasors.
1. False
2. True
3. True
4. False
5. False
You might also like to view...
One thing you won’t find in the book is
a. a lot of hard and fast usability rules. b. illustrations. c. footnotes.
All what-if analysis tools are located in the ________ tab
Fill in the blank(s) with correct word
What is the term "full-frame sensor" based from?
What will be an ideal response?
Use a(n) ______ to connect a computer to a phone line
A) Audio adapter B) Modem C) Telephone D) RJ-45 adapter