Multiple Choice
What is an advantage of the anomaly detection method?
A) makes use of signatures of well-known attacks
B) system can detect attacks from inside the network by people with stolen accounts
C) easy to understand and less difficult to configure than a signature-based system
D) after installation, the IDPS is trained for several days or weeks
Correct Answer:

Verified
Correct Answer:
Verified
Q4: _ procedures are a set of actions
Q5: What are the four common entry points
Q6: Which IDPS customization option is a list
Q7: What is an inline sensor and how
Q8: In a _ based detection system,the IDPS
Q10: MATCHING<br>-an attempt to gain unauthorized access to
Q11: MATCHING<br>-the process of maintaining a table of
Q12: An IDPS consists of a single device
Q13: MATCHING<br>-the entire length of an attack<br>A)accountability<br>B)escalated<br>C)event horizon<br>D)inline
Q14: MATCHING<br>-an IDPS component that monitors traffic on