A system administrator is implementing an IDS on the database server to see who is trying to access the server. The administrator relies on the software provider for what to detect. Which of the following would MOST likely be installed?

A. Behavior based IDS
B. Network based IDS
C. Signature based IDS
D. Honeypot


Answer: C. Signature based IDS

Computer Science & Information Technology

You might also like to view...

Because it is math-based a(n) ________ image retains perfect clarity when it is edited or resized

Fill in the blank(s) with correct word

Computer Science & Information Technology

A(n)________ is a connection between two information systems for the purpose of exchanging data

a. Interface b. Message c. Protocol d. Point-to-point connection

Computer Science & Information Technology

For conditional formatting, a formula must be in the form of a(n) _____ test that results in a true or false value.

A. conditional B. hypothetical C. logical D. approximate

Computer Science & Information Technology

What is the name of the scheme that determines data rates in WLANs?

Computer Science & Information Technology