Answer the following statements true (T) or false (F)

1. The IDS component responsible for collecting data is the user interface.
2. Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.
3. The primary purpose of an IDS is to detect intrusions, log suspicious
events, and send alerts.
4. Signature-based approaches attempt to define normal, or expected,
behavior, whereas anomaly approaches attempt to define proper behavior.
5. Anomaly detection is effective against misfeasors.


1. False
2. True
3. True
4. False
5. False

Computer Science & Information Technology

You might also like to view...

One thing you won’t find in the book is

a. a lot of hard and fast usability rules. b. illustrations. c. footnotes.

Computer Science & Information Technology

All what-if analysis tools are located in the ________ tab

Fill in the blank(s) with correct word

Computer Science & Information Technology

What is the term "full-frame sensor" based from?

What will be an ideal response?

Computer Science & Information Technology

Use a(n) ______ to connect a computer to a phone line

A) Audio adapter B) Modem C) Telephone D) RJ-45 adapter

Computer Science & Information Technology