Answer the following statements true (T) or false (F)

1. A weakness of the IDES approach is its lack of flexibility. ??
2. To be of practical use an intrusion detection system should detect a substantial percentage of intrusions while keeping the false alarm rate at an acceptable level. ?
3. ? System administrators can stop all attacks and hackers from penetrating their systems by installing software patches periodically. ?
4. Password crackers rely on the fact that some people choose easily guessable passwords. ??
5. ?Traditional hackers usually have specific targets, or at least classes of targets in mind. ?


1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

Which of the following statements about the colors of hyperlinks is false?

A) The hyperlink colors are connected to the current theme. B) To avoid confusion, they are set and cannot be changed. C) The hyperlink color can change when the hyperlink has been followed. D) Followed hyperlinks have a default color which can be changed by a theme.

Computer Science & Information Technology

Contextual targeting analyzes keywords on your blog to match ads to blog content. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Working principles of security and quality in the code is also called what?

A. Software development B. Best practices C. C.I.A. D. Coding

Computer Science & Information Technology

In Adobe Premiere Elements, the Project tasks panel holds all the media files you might use in your video project.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology