Match each item with a statement below.
A. The process by which an attacker changes the format of the network packets and/or timing of their activities to avoid being detected by the IDPS.
B. The process of reducing IDPS events in order to receive a better confidence in the alerts received.
C. An alert or alarm that occurs in the absence of an actual attack.
D. A value that sets the limit between normal and abnormal behavior.
E. The process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing both false positives and false negatives.
F. An indication that a system has detected a possible attack.
G. IDPS events that are accurate and noteworthy but do not pose a significant threat to information security.
H. A value placed on an IDPS event's ability to correctly detect and identify certain types of attacks.
I. The failure of an IDPS to react to an actual attack event.
A. Evasion
B. Filtering
C. False positive
D. Thresholds
E. Tuning
F. Alert
G. Events
H. Confidence
I. False negative
You might also like to view...
Type parameters _____________.
a) are identifiers that are used in place of actual type names b) can be used to declare the return type c) act as placeholders for the types of the argument passed to the generic method d) All of the above
calcH solves H = kA(T2 - T1) / X for H double calcH (double k, double A, double T2, double T1, double X)
What will be an ideal response?
The suffix is a(n) ____-letter abbreviation that groups domain names based on their category.
A. two or three B. three C. two to four D. two or more