Intrusion-Detection Systems
A system that is setup for attracting and monitoring intruders is called?
Honeypot
Specter aggressive mode tries to trace the attacker and gain its identity
True
What type of IDS is Snort?
Host based
Which of the following is NOT a profiling strategy used in anomaly detection?
System monitoring
A profiling technique that monitors how applications use resources is called?
Application monitoring
A series of ICMP packets sent to your ports in sequence might indicate what?
a ping flood
What is another term for preemptive blocking?
Banishment vigilance
Last updated