Device IDSs typically send log files to the central IDS log file using the ________ protocol.
A) FTP
B) HTTP
C) TFTP
D) SysLog
Correct Answer:
Verified
Q58: Which of the following MUST be followed?
A)
Q59: Successful attacks are called _.
A) incidents
B) countermeasures
C)
Q60: Implementation guidance is less specific than _.
A)
Q61: _ log provable attack packets.
A) Firewalls
B) IDSs
C)
Q62: Live rehearsals are important because they _
Q64: _ focus on suspicious packets.
A) Firewalls
B) IDSs
C)
Q65: The rate of alarms in IDSs is
Q66: Real-time fail-over with synchronized data centers _.
A)
Q67: Desktop (tabletop)rehearsals are important because they _
Q68: _ stop definite attack packets.
A) Firewalls
B) IDSs
C)
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents