Answer the following statements true (T) or false (F)

1. To be of practical use an IDS should detect a substantial percentage of
intrusions while keeping the false alarm rate at an acceptable level.
2. An inline sensor monitors a copy of network traffic; the actual traffic
does not pass through the device.
3. A common location for a NIDS sensor is just inside the external
firewall.
4. Network-based intrusion detection makes use of signature detection
and anomaly detection.
5. Snort can perform intrusion prevention but not intrusion detection.


11. T
12. F
13. T
14. T
15. F

Computer Science & Information Technology

You might also like to view...

Which of the following code displays the area of a circle if the radius is positive.

a. if (radius != 0) System.out.println(radius * radius * 3.14159); b. if (radius >= 0) System.out.println(radius * radius * 3.14159); c. if (radius > 0) System.out.println(radius * radius * 3.14159); d. if (radius <= 0) System.out.println(radius * radius * 3.14159);

Computer Science & Information Technology

You selected rows in a table one at a time and applied a gray background tint to every other row. What is a better method to shade alternate rows of a table? Why is that method better?

What will be an ideal response?

Computer Science & Information Technology

What advanced port-scanning tool can allow a security tester to bypass filtering devices by injecting crafted or otherwise modified IP-packets into a network?

A. Hping B. NetTools C. Nessus D. Nmap

Computer Science & Information Technology

In a posttest loop, the condition is evaluated before the instructions within the loop are processed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology