Short Answer
Network-based intrusion-detection software is used on a computer or network device and typically places the NIC on that device in ____________________ mode.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q39: Which active intrusion-detection tool monitors for intruders
Q40: What are the three principle event logs
Q41: File locks are open communication links between
Q42: In Network Monitor the capture store is
Q43: In Red Hat Linux, the Emacs and
Q45: Which passive intrusion-detection tool audits activities on
Q46: In Windows Server 2003, the _ log
Q47: In the event log, a notice that
Q48: An inspector is an IDS that tracks
Q49: Understanding the normal conditions for operating systems