Multiple Choice
Match each statement with an item below.
-Examines data traffic in search of patterns that match known signatures - that is,preconfigured,predetermined attack patterns.
A) Intrusion detection system
B) HIDS
C) Signature-based IDS
D) Enticement
E) Entrapment
F) Alarm clustering
G) NIDS
H) Nmap
I) Scanning utility
Correct Answer:

Verified
Correct Answer:
Verified
Q1: The _ contains the rules and configuration
Q2: _ is the process of classifying the
Q3: A(n)_ monitors traffic on a segment of
Q5: The term _ refers to a consolidation
Q6: The smart systems administrator backs up system
Q7: The term _ refers to a value
Q8: _ occurs when valid packets exploit poorly
Q9: _ are tools used to identify which
Q10: A(n)_ can adapt its reaction activities based
Q11: The task of monitoring file systems for