Intrusion-Detection Systems

A system that is setup for attracting and monitoring intruders is called?


Specter aggressive mode tries to trace the attacker and gain its identity


What type of IDS is Snort?

Host based

Which of the following is NOT a profiling strategy used in anomaly detection?

System monitoring

A profiling technique that monitors how applications use resources is called?

Application monitoring

A series of ICMP packets sent to your ports in sequence might indicate what?

a ping flood

What is another term for preemptive blocking?

Banishment vigilance

Last updated