Multiple Choice
Network behavior analysis system __________ sensors are typically intended for network perimeter use, so they are deployed in close proximity to the perimeter firewalls, often between the firewall and the Internet border router to limit incoming attacks that could overwhelm the firewall.
A) inline
B) offline
C) passive
D) bypass
Correct Answer:

Verified
Correct Answer:
Verified
Q66: When a collection of honeypots connects several
Q67: The <u>integrity</u> value, which is based upon fuzzy logic,
Q68: In TCP/IP networking, port _ is not
Q69: When using trap-and-trace, the <u>trace</u> usually consists
Q70: Preconfigured, predetermined attack patterns are called <u>signatures</u>.
Q72: The Simple Network Management Protocol contains trap
Q73: The primary advantages of a centralized IDPS
Q74: HIDPSs are also known as system _
Q75: A false positive is the failure of
Q76: Intrusion _ activities finalize the restoration of