Question: a. What do firewalls do that IDSs do not? 20a.) ______ stop definite attack packets. a. Firewalls b. IDSs c. Both A and B d.
a. What do firewalls do that IDSs do not?
20a.) ______ stop definite attack packets.
a. Firewalls
b. IDSs
c. Both A and B
d. Neither A nor B
b. What do IDSs do that firewalls do not?
20b.) ______ focus on suspicious packets.
a. Firewalls
b. IDSs
c. Both A and B
d. Neither A nor B
c .Compare what is logged by IDSs and firewalls.
20c.) ______ log provable attack packets.
a. Firewalls
b. IDSs
c. Both A and B
d. Neither A nor B
d. Why are IDS false alarms a problem?
20d.) The rate of alarms in IDSs is usually ______ .
a. About right
b. Somewhat more than desirable
c. Much more than desirable
d. Optimized for rapidly finding real incidents
e. What standard do device IDSs normally use to send their log data to the central IDS?
20e.) Device IDSs typically send log files to the central IDS log file using the ______ protocol.
a. FTP
b. HTTP
c. TFTP
d. SysLog
Step by Step Solution
3.42 Rating (161 Votes )
There are 3 Steps involved in it
a They stop packets 20a A Firewalls b They detect suspicious pac... View full answer
Get step-by-step solutions from verified subject matter experts
