A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?
A. Behavior based IDS
B. Network based IDS
C. Signature based IDS
D. Honeypot
Answer: C. Signature based IDS
Computer Science & Information Technology
You might also like to view...
Because it is math-based a(n) ________ image retains perfect clarity when it is edited or resized
Fill in the blank(s) with correct word
Computer Science & Information Technology
A(n)________ is a connection between two information systems for the purpose of exchanging data
a. Interface b. Message c. Protocol d. Point-to-point connection
Computer Science & Information Technology
For conditional formatting, a formula must be in the form of a(n) _____ test that results in a true or false value.
A. conditional B. hypothetical C. logical D. approximate
Computer Science & Information Technology
What is the name of the scheme that determines data rates in WLANs?
Computer Science & Information Technology