Multiple Choice
The difference between misuse and anomaly IDS models is
A) Misuse models require knowledge of normal activity,whereas anomaly models don't.
B) Anomaly models require knowledge of normal activity,whereas misuse models don't.
C) Anomaly models are based on patterns of suspicious activity.
D) Anomaly model-based systems suffer from many false negatives.
Correct Answer:

Verified
Correct Answer:
Verified
Q32: Which of the following is NOT a
Q33: While NIDS are able to detect activities
Q34: The security tool that will hide information
Q35: How does IPS differ from an IDS?<br>A)IPS
Q36: What was wrong with the first host-based
Q38: _ are host-based protective mechanisms that monitor
Q39: Egress filtering<br>A)Scans incoming mail to catch spam<br>B)Scans
Q40: _ products filter out the junk e-mail.
Q41: Antispam does all of the following EXCEPT:<br>A)Blacklisting<br>B)Malicious
Q42: Windows Defender does all of the following