Multiple Choice
Which of the following is true about the steps in setting up and using an IDPS?
A) anomaly-based systems come with a database of attack signatures
B) sensors placed on network segments will always capture every packet
C) alerts are sent when a packet doesn't match a stored signature
D) false positives do not compromise network security
Correct Answer:

Verified
Correct Answer:
Verified
Q40: No actual traffic passes through a passive
Q41: Which of the following is considered a
Q42: If you see a /16 in the
Q43: Define stateful protocol analysis.Include in your answer
Q44: Why might you want to allow extra
Q45: What are the four typical components of
Q46: The period of time during which an
Q47: A hybrid IDPS combines aspects of NIDPS
Q48: Which of the following is NOT a
Q50: Contrast anomaly detection with signature detection.