Multiple Choice
The rate of alarms in IDSs is usually ________.
A) about right
B) somewhat more than desirable
C) much more than desirable
D) optimized for rapidly finding real incidents
Correct Answer:

Verified
Correct Answer:
Verified
Q46: Successful attacks are called _.<br>A) incidents<br>B) countermeasures<br>C)
Q47: Balancing threats against protection costs is called
Q48: Which of the following MUST be followed?<br>A)
Q49: Ideally,access control should be based on _.<br>A)
Q50: Policies are separated by implementation to take
Q52: Desktop (tabletop)rehearsals are important because they _
Q53: By changing credentials verification information on a(n)_,a
Q54: Servers in the DMZ should be freely
Q55: Compliance with _ is voluntary.<br>A) guidelines<br>B) standards<br>C)
Q56: _ stop definite attack packets.<br>A) Firewalls<br>B) IDSs<br>C)