Multiple Choice
An IDS follows a two-step process consisting of a passive component and an active component. Which of the following is part of the active component?
A) Inspection of password files to detect inadvisable passwords
B) Mechanisms put in place to reenact known methods of attack and record system responses
C) Inspection of system to detect policy violations
D) Inspection of configuration files to detect inadvisable settings
Correct Answer:

Verified
Correct Answer:
Verified
Q14: This is an encryption/decryption key known only
Q15: This enables users of a basically unsecure
Q16: This is a series of messages sent
Q17: This is a Peripheral Component Interconnect (PCI)
Q18: At which two traffic layers do most
Q20: "Semantics-aware" signatures automatically generated by Nemean are
Q21: Which of the following is an advantage
Q22: When discussing IDS/IPS, what is a signature?<br>A)An
Q23: One of the most obvious places to
Q24: In which of the following exploits does