1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
asambeis [7]
3 years ago
13

You are concerned about protecting your network from network-based attacks on the internet. Specifically, you are concerned abou

t attacks that have not yet been identified or that do not have prescribed protections. Which type of device should you use
Computers and Technology
1 answer:
MatroZZZ [7]3 years ago
7 0

Answer:

Anomaly-based IDS

Explanation:

An anomaly-based intrusion detection system (IDS) can recognize and respond to some unknownattacks. Signature recognition, also referred to as pattern matching or dictionary recognition, looksfor patterns in network traffic and compares them to known attack patterns called signatures.Signature-based recognition cannot detect unknown attacks; they can only detect attacks identifiedby published signature files.Anti-virus software is a form of signature-based IDS. A network-based firewall filters packets for anetwork, while a host-based firewall filters packets for a host. Firewalls are typically configured usingaccess control lists that identify specific traffic that is allowed or denied.

You might be interested in
What type of encoding is this?<br>0x6a656c6c7966697368<br>cause I'm trying to decode it
katen-ka-za [31]
According to its structure I'd say that this is SEAL (<span>Software-Optimized Encryption Algorithm). It's difficult to describe how it works, because this kind of ciphers is very tricky. This algorithm uses 160 bit key and it uses 3 tables (R, S, T) to encode and decode.

I'll attach the image where you can see a process of creating a pseudo-random function:
</span>

7 0
3 years ago
Which of the following helps create a positive community?
Lera25 [3.4K]

Answer: D.) all of the above

Explanation: By doing all three of these it makes almost everyone in the community is happier and more positive which is better than the bully's & people who don't speak up feel less entitled, it achieves the goal.

5 0
3 years ago
PLEASE HELP ME ASAP I NEED THIS FOR FLVS
Temka [501]
If it’s a file that can only be runned by windows that you wont be able to download it
3 0
3 years ago
#include #include int main( ) { int value = 10; int pid; value += 5; pid = fork( ); if (pid &gt; 0 ) { value += 20; } printf(val
ss7ja [257]

Explanation:

To understand how this program is working let us print the variable value at different stages of the program so that we can understand how it is working.

Intitally, value=10 when it was declared.

Then we added 5 and it become value=15

then we used fork() function which creates a parent(orignal) and child(duplicate)

When fork() succeeds it returns the child pid to parent and returns 0 to the child. As you can see (pid > 0) condition is always true therefore the parent pid value becomes 35 ( 15+20) and the child pid value becomes 0.

#include <stdio.h>

#include <unistd.h>

int main( ) {

   int value = 10;

     printf("%d\n",value);

   int pid;

   value += 5;

     printf("%d\n",value);

   pid = fork( );

     printf("%d\n",pid);

   if (pid > 0 )

   {

       value += 20;

   }

   printf("%d\n",value);

   return 0;

}

Output:

10 (initial value)

15 (modified value)

5343 (pid when fork is used)

35 (final modified value)

0 (child value)

15 (the parent value when fork was used)

8 0
4 years ago
What do you like to play
Ad libitum [116K]

Answer:I like to play sports

Explanation:

3 0
3 years ago
Read 2 more answers
Other questions:
  • If you could make any blog, what would it be about and why?
    9·1 answer
  • Why process scheduling is needed in a uni-processor system?
    12·1 answer
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • What is a cell in computers
    7·2 answers
  • For this assignment you must do the following tasks in order: (1) START EARLY. (2) READ THE ASSIGNMENT MULTIPLE TIMES to underst
    13·1 answer
  • Ellen has eggs she wishes to trade for grain. However, she cannot find anyone with grain that needs eggs. What is missing for th
    14·1 answer
  • Why is spyware more dangerous than adware
    5·1 answer
  • Write a program to accept two numbers<br>in two lines and find Square root of Squares<br>of thion​
    13·1 answer
  • One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You
    10·2 answers
  • Which validation check can be used on the following data. "XX000" 
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!