1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yarga [219]
2 years ago
10

An administrator deploys a basic network intrusion detection (NID) device to block common patterns of attacks. What detection me

thod does this device use
Computers and Technology
1 answer:
shusha [124]2 years ago
8 0

The type of detection method that this basic network intrusion detection (NID) device use is Signature-based.

<h3>What is signature-based detection?</h3>

A Signature-based detection is known to be a term that is often referenced to cybersecurity.

Note that it involves the use of footprints to recognize any form of malware. It is known that have programs, apps, software, etc., often consist of a digital footprint and as such the use of this detection can be able to identify the attack.

Learn more about  network intrusion from

brainly.com/question/26199042

You might be interested in
Swapping Order of Vowels Write a program to swap the order of the vowels in a given word. For example, if the word is programmin
Georgia [21]

Answer:

Program is as follow:

Explanation:

#include<iostream.h>

#include < conio.h>

bool isVowel(char b)

{

return

( b=='a' || b=='A' || b=='e' || b=='E' || b=='i' || b=='I' || b=='o' || b=='O' || b== 'u' || b=='U');

For swaoing the vowels

string reverseVowel ( String str)

{

int j = 0;

string v ;

for ( int i= 0 ; str [i]]!='0'; i++)

if( isv(str[i]))

v[j++] = str[i[;

for ( int i = 0; str[i]! = '0' ; i++

if ( isv (str[i]))

str{i} = v [--j]

return str;

}

int main ()

{ string str = " Programming";

cout<<swapv(str);

return 0 ;

}

7 0
3 years ago
How is digital footprint created ?
dalvyx [7]

Answer:

by simply just logging on and using the internet.

Explanation:

4 0
3 years ago
Co to jest podprogram (procedura lub funkcja)? Zaznacz poprawną odpowiedź. a) Wielokrotne powtarzanie tych samych poleceń. b) Wy
ale4655 [162]

Answer:

  b)  A separate part of the program that performs a specific task.

Explanation:

A subroutine is a portion of the program that can be invoked to perform a specific task. Typically, it performs that task and returns execution control to the point immediately following its invocation. It may or may not maintain "history" or "state", and it may or may not throw exceptions.

A well-behaved subroutine will only operate on data passed to it, will not maintain any internal history or state, and will have only one exit.

8 0
3 years ago
Electricity from has enough energy to stop your what?
Ne4ueva [31]

Can I get some options?


The second one is most likely "Heart", but the first one could be a number of things, unless this just pasted incorrectly.'


5 0
4 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Other questions:
  • The overall purpose of CSS is to modify the way web pages look without modifying the underlying HTML code. way tables render in
    12·2 answers
  • What type of computer is likely to use so-dimms, have an internal power supply, and use a desktop processor socket?
    10·1 answer
  • If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
    6·1 answer
  • 10 disscused reasons why organisatoions use electronic spreedsheet​
    14·1 answer
  • Consider an allocator on a 32-bit system that uses an implicit free list. Each memory block, either allocated or free, has a siz
    11·1 answer
  • write a java program that prompts the user to enter scores (each number an integer from 0 to 10) and prints the following output
    13·1 answer
  • If you can name this you get 15 points: ↑↑↓↓←→←→βα
    10·1 answer
  • If an engineer wants to verify changes that she has been making on a router, which commands will allow her to check the routers
    15·1 answer
  • Q.2 (A)
    5·1 answer
  • In C++ please (read the image below for instructions)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!