# Intrusion-Detection Systems

A system that is setup for attracting and monitoring intruders is called?

> Honeypot

Specter aggressive mode tries to trace the attacker and gain its identity

> True

What type of IDS is Snort?

> Host based

Which of the following is NOT a profiling strategy used in anomaly detection?

> System monitoring

A profiling technique that monitors how applications use resources is called?

> Application monitoring

A series of ICMP packets sent to your ports in sequence might indicate what?

> a ping flood

What is another term for preemptive blocking?

> Banishment vigilance
