Which of the following is true about the steps in setting up and using an IDPS?
A) anomaly-based systems come with a database of attack signatures
B) sensors placed on network segments will always capture every packet
C) alerts are sent when a packet doesn't match a stored signature
D) false positives do not compromise network security
Correct Answer:
Verified
Q24: MATCHING
-an NIDPS sensor that examines copies of
Q25: Which of the following is true about
Q26: Anomaly detection systems make use of _
Q27: MATCHING
-the process of maintaining a table of
Q28: In a _ based detection system,the IDPS
Q30: Why might you want to allow extra
Q31: A network _ is a type of
Q32: Which of the following is an IDPS
Q33: MATCHING
-the ability to track an attempted attack
Q34: MATCHING
-sets of characteristics that describe network services
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents