Describe the response behavior of IDPSs.

What will be an ideal response?


IDPSs responds to external stimulation in different ways, depending on their configurations and functions. Some respond in active ways, collecting additional information about the intrusion, modifying the network environment, or even taking action against the intrusion. Others respond in passive ways - for example, by setting off alarms or notifications or by collecting passive data through SNMP traps.

Computer Science & Information Technology

You might also like to view...

After you mark text as a(n) ________ entry, a field is inserted to the right of the selected text

Fill in the blank(s) with correct word

Computer Science & Information Technology

What information do organizations forget to bring to the disaster recovery site?

A) Backups B) Hardware C) Software licenses D) Software

Computer Science & Information Technology

A device driver is a piece of hardware designed to control a printer

Indicate whether the statement is true or false

Computer Science & Information Technology

The type of network shown in the accompanying figure, describes a network in which each computer has equal responsibilities and capabilities. What is this kind of network called?

A. file B. P2P C. print D. linked

Computer Science & Information Technology