Question: Content-3019 Spring Tem(1) Xth Module 1 Pretest attempt php attempt-1594073&cmid 9304&page-5 TEX el earning -Engish-Unied Sules (en_us)2 M) courses. This course , What does a
Content-3019 Spring Tem(1) Xth Module 1 Pretest attempt php attempt-1594073&cmid 9304&page-5 TEX el earning -Engish-Unied Sules (en_us)2 M) courses. This course , What does a host-based Intrusion Detection System do? Qunation 11 Not yet Pots out of 1.00 P Flag question anoweredSelect Select one a. A host-based IDS does a better job of filtering unwanted network traffic, since it only has to O b. A host-based IDS examines network traffic after it has been encrypted and monitors for signs that O c A host-based ID)S monitors a single computer for signs of attack. It is capable of gathering O d. A bost-based IDS monitors the user's activities and ensures that the user is using the computer in monitor traffic for one system the encryption may have been defeated by an attacker information, like CPU load, that a network-based IDS cannot accordance with the Acceptable Use Policy (AUP) of his corporation 12 What kind of protection is offered by a network-based Intrusion Prevention System (IPS)? Select oee a.Monitoring of log filkes of each system connected to the aerwork b.Monitoring of the entire or most of activiry on a networl P Flag question CMonitoring of peogram (Leprocess, application) activity on each individual computer on the d.Monitoring of user activities to ensure thar corporate esplonage is not occurring e. Descrilbe the proectios offered by bos IPS SAMSUNG 5 6 7 8 8
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
