Question: 1. Installed on a single workstation to protect that computer against an attack. A, Single attack vector B, Fragmentation Detection Software C, Host-based IDS D,
1. Installed on a single workstation to protect that computer against an attack.
A, Single attack vector
B, Fragmentation Detection Software
C, Host-based IDS
D, Network based IDS
2Type of IDS that analyzes patterns and compares those patterns to known attack types.
A, Signature-based IDS
B, Intrusion Prevention System
C, Host-based IDS
D, Network based IDS
3. A device that monitors traffic as it enters the network.
A, Shadow-state IDS
B, Internal IDS
C, Buffer overflow
D,Front End IDS
4.Takes action to mitigate a threat once an attack is detected.
A,IDS
B, Firewall
C, IPS
D, VPN
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
