Question: a. What do firewalls do that IDSs do not? 20a.) ______ stop definite attack packets. a. Firewalls b. IDSs c. Both A and B d.

a. What do firewalls do that IDSs do not?

20a.) ______ stop definite attack packets.

a. Firewalls

b. IDSs

c. Both A and B

d. Neither A nor B


b. What do IDSs do that firewalls do not?

20b.) ______  focus on suspicious packets.

a. Firewalls

b. IDSs

c. Both A and B

d. Neither A nor B


c .Compare what is logged by IDSs and firewalls.

20c.) ______  log provable attack packets.

a. Firewalls

b. IDSs

c. Both A and B

d. Neither A nor B


d. Why are IDS false alarms a problem?

20d.) The rate of alarms in IDSs is usually ______ .

a. About right

b. Somewhat more than desirable

c. Much more than desirable

d. Optimized for rapidly finding real incidents


e. What standard do device IDSs normally use to send their log data to the central IDS?

20e.) Device IDSs typically send log files to the central IDS log file using the ______  protocol.

a. FTP

b. HTTP

c. TFTP

d. SysLog

Step by Step Solution

3.42 Rating (161 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

a They stop packets 20a A Firewalls b They detect suspicious pac... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Business Data Networks Questions!