Which of the following examines network traffic to identify threats that generate unusual traffic flow?

A. Wireless IDS
B. Network-based IDS
C. Host-based IDS
D. Network behavior analysis IDS


Answer: D
Explanation: Network behavior analysis IDSs examine network traffic to identify threats that generate unusual traffic flow. Host-based IDSs monitor a single system. Wireless IDSs monitor wireless traffic. Network-based IDSs monitor network traffic.

Computer Science & Information Technology

You might also like to view...

Which of the following is an example of a remote access attack?

A) Using a Linux live CD to bypass the password B) Using OphCrack to crack the password C) Using an SQL injection D) Using OphCrack

Computer Science & Information Technology

Which command is used to create user accounts and update default information for new users?

A. userdel B. newgrp C. chage D. useradd

Computer Science & Information Technology

The ________, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.

A. system unit B. ALU C. microprocessor D. CPU

Computer Science & Information Technology

What is QoS?

What will be an ideal response?

Computer Science & Information Technology