Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security
Quiz 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Short Answer
A(n) ____________________ system contains pseudo-services that emulate well-known services, but is configured in ways that make it look vulnerable to attacks.
Question 82
Short Answer
In ____________________ protocol verification, the higher-order protocols are examined for unexpected packet behavior or improper use.
Question 83
Short Answer
A signature-based IDPS is sometimes called a(n) ____________________-based IDPS.
Question 84
Short Answer
A(n) ____________________ IDPS can adapt its reactions in response to administrator guidance over time and circumstances of the current local environment.
Question 85
Short Answer
Three methods dominate IDPS detection methods: the ____________________-based approach, the statistical anomaly-based approach, and the stateful packet inspection approach.