A host-based intrusion detection system (IDS) :
A) uses rules to analyze suspicious activity at the perimeter of a network or at key locations in the network.
B) resides on the server that is being monitored where it can detect whether critical or security-related files have been tampered with or whether a user has attempted to access files that he or she is not authorized to use.
C) can perform certain actions when an attack occurs,such as terminating network connections based on security policies.
D) consists of information system resources-firewalls,routers,Web servers,database servers,and files that look like production systems,but do no real work.
Correct Answer:
Verified
Q40: The process of determining what the authenticated
Q41: _ refers to techniques to steal the
Q42: Public key infrastructure (PKI)is an authentication method
Q43: _ is a nontechnical attack that uses
Q44: Which of the following statements about hardware
Q46: All of the following are characteristics of
Q47: The _ was invented by Netscape to
Q48: _ are weaknesses in software or other
Q49: Why should EC companies comply with ethical
Q50: Firewalls that filter requests from the Internet
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents