Multiple Choice
Intrusion Detection Systems IDS) are designed to monitor network traffic and identify threats that may have breached the networks initial defenses. These include all of the following except:
A) An attacker who is using the identity or credentials of a legitimate user to gain access to an IS, device, or network
B) A legitimate user who performs actions he is not authorized to do
C) A user who tries to disguise or cover up his actions by deleting audit files or system logs.
D) Employees who use computing or network resources inefficiently.
Correct Answer:

Verified
Correct Answer:
Verified
Q41: Symptoms of fraud that can be detected
Q42: A gateway is a system, or group
Q43: One way that hackers and corporate spies
Q44: An important element in any security system
Q47: The major objective of authentication is to
Q48: Theft of data, inappropriate use of data<br>e.g.,
Q49: The supervision, monitoring, and control of the
Q50: A data breach typically costs an organization
Q51: People who have their social security or
Q97: _ is a term referring to a