1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rina8888 [55]
1 year ago
7

which endpoint application runs on an endpoint device that only detects an attack in an endpoint device? chqgg

Computers and Technology
1 answer:
WARRIOR [948]1 year ago
5 0

A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.

<h3>What is Host-Based IPS?</h3>
  • A host-based intrusion detection system works similarly to a network-based intrusion detection system in that it can monitor and analyze both the internal workings of a computer system and the network packets on its network ports.
  • The Host-based Intrusion Prevention System (HIPS) guards against malicious software and other activities that aim to harm your computer. HIPS uses sophisticated behavioral analysis in conjunction with network filtering's detection capabilities to keep track of active programs, files, and registry keys.
  • The integrated endpoint security system known as endpoint detection and response (EDR), also referred to as endpoint threat detection and response (ETDR), combines real-time continuous monitoring and gathering of endpoint data with rules-based automated reaction and analysis capabilities.

To learn more about Host-Based IPS refer to:

brainly.com/question/20490376

#SPJ4

You might be interested in
James is an intern in a film production company. On his first day, James’ boss, Monica, tells him, “Before anything else, let me
bija089 [108]

Answer:

cinematography is the answer broodaaa

6 0
3 years ago
Identity management programs often implement a _________system that facilitates the management of user accounts.
Trava [24]

Answer:

single sign-on

Explanation:

Identity management programs in computer operation involve an administrative process that is carried out by implementing a SINGLE SIGN-ON system that facilitates the management of user accounts.

The purpose is to identify, validate, and approve an individual or group of people to have permission to various applications, computer systems, or networks by linking user rights and limitations with created identities.

Hence, in this case, the correct answer is SINGLE SIGN-ON

6 0
3 years ago
"Bullet Lists" can be which of the following?
MariettaO [177]

Answer:

letters and numbered

Explanation:

7 0
4 years ago
Read 2 more answers
What are some consequences of internet addiction​
fenix001 [56]

Answer:

<em>1</em><em>. </em><em>week</em><em> </em><em>eyesight</em>

<em>2</em><em>. </em><em> </em><em>weak</em><em> </em><em>brain</em><em> </em><em>power</em>

<em>3</em><em>. </em><em>loss</em><em> </em><em>of</em><em> </em><em>concentra</em><em>tion</em><em>.</em><em>.</em><em>.</em>

<em>hope</em><em> </em><em>it</em><em> </em><em>helps</em><em> </em><em>u</em>

4 0
3 years ago
One solid rule of thumb when prioritizing is to:
zalisa [80]

The only one that would make sense in for this is C


Answer- C

8 0
3 years ago
Read 2 more answers
Other questions:
  • In presentation software, what is the area that displays behind the information you place on a slide?
    5·1 answer
  • how can people access to a range of online services affect their ability to operate safely in the digital world
    11·1 answer
  • Banking, insurance, telecommunications, and education are examples of the type of knowledge industry that A. has information as
    12·2 answers
  • The Python MySQL Connector library:
    15·1 answer
  • ______________ in SONET are analogous to the ________________ of T-carriers.
    7·1 answer
  • Pls help computer science I will give brainliest
    8·2 answers
  • How can you continue learning about computer science and improve your coding abilities?
    5·1 answer
  • Convert the following numbers to binary numbers: 5 , 6 , 7 , 8 , 9 .​
    13·2 answers
  • O
    14·1 answer
  • How can edge computing be used to increase sustainability
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!