Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Business
Study Set
Principles of Information Security Study Set 1
Quiz 7: Security Technology: Intrusion Detection and Prevention Systems, and Other Security Tools
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 81
Short Answer
A(n)____________________ occurs when an attacker attempts to gain entry or disrupt the normal operations of an information system,almost always with the intent to do harm.
Question 82
Essay
When the measured activity is outside the baseline parameters,it is said to exceed the ____________________ level.
Question 83
Short Answer
A(n)____________________ IDPS can adapt its reactions in response to administrator guidance over time and circumstances of the current local environment.
Question 84
Essay
Alarm ____________________ and compaction is a consolidation of almost identical alarms that happen at close to the same time into a single higher-level alarm.
Question 85
Short Answer
Three methods dominate the IDPSs detection methods: ____________________-based approach,statistical anomaly-based approach or the stateful packet inspection approach.