focusNode Show
Didn't know it? Knew it? Embed Code - If you would like this activity on your web page, copy the script below and paste it into
your web page. Chapter 7
When the IDPS detects the attackers cell system seamlessly transfers them to a special environment where they can cause no harm hence the name padded cell?When the IDS detects attackers, it seamlessly transfers them to a special simulated environment where they can cause no harm—the nature of this host environment is what gives the approach its name, padded cell. 9. What is network footprinting?
What is fully distributed control strategy?Fully Distributed Control Strategy.
As presented in Figure 7-5, a fully distributed IDS control strategy is the opposite of the centralized strategy. Note in the figure that all control functions (which appear as small square symbols enclosing a computer icon) are applied at the physical location of each IDS component.
Which kind of IDPS examines traffic flow on a network in an attempt to recognize abnormal patterns?Network behavior analysis (NBA) analyzes network traffic to detect unusual traffic flows and spot new malware or zero-day vulnerabilities. Wireless intrusion prevention system (WIPS) simply scans a Wi-Fi network for unauthorized access and removes any unauthorized devices from the network.
What is the process of adjusting IDPS to maximize its efficiency in detecting true positives while minimizing both false positives and false negatives?Tweaking is the process of adjusting an IDPS to maximize its efficiency in detecting true positives while minimizing false positives and false negatives.
|