Which of the following examines network traffic to identify threats that generate unusual traffic flow?
A. Wireless IDS
B. Network-based IDS
C. Host-based IDS
D. Network behavior analysis IDS
Answer: D
Explanation: Network behavior analysis IDSs examine network traffic to identify threats that generate unusual traffic flow. Host-based IDSs monitor a single system. Wireless IDSs monitor wireless traffic. Network-based IDSs monitor network traffic.
You might also like to view...
Which of the following is an example of a remote access attack?
A) Using a Linux live CD to bypass the password B) Using OphCrack to crack the password C) Using an SQL injection D) Using OphCrack
Which command is used to create user accounts and update default information for new users?
A. userdel B. newgrp C. chage D. useradd
The ________, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.
A. system unit B. ALU C. microprocessor D. CPU
What is QoS?
What will be an ideal response?