1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
8

Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp

le of a _____________, ____________-based IDS/IPS.
Computers and Technology
2 answers:
pantera1 [17]3 years ago
4 0
The correct answer for this question is this one: "anomaly, network." <span>Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of an Anomaly, Network-based IDS/IPS.</span>
laiz [17]3 years ago
3 0

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


You might be interested in
How much should I borrow on a direct loan
olga_2 [115]
I recommend between $5,500 and $12,500 each year.
7 0
3 years ago
A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to t
yKpoI14uk [10]
It's VPN(Virtual Private Network). It allows company to have private network at the same time secure. While others are not that secure.
4 0
3 years ago
over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. you need a way to track w
Nuetrik [128]

One way to track who made these changes to the virtual machine cloud settings and when is to: D. enable cloud resource activity auditing.

<h3>What is a cloud?</h3>

In Computer technology, a cloud can be defined as the elastic leasing of pooled computer resources such as physical hardware through virtualization and over the Internet, so as to enable the storage and sharing of files and documents virtually and in real-time.

In this scenario, we can reasonably infer and logically conclude that one way to track who made these changes to the virtual machine cloud settings and when is to enable cloud resource activity auditing because it would provide a log of actions such as information about the engineer who made configuration changes.

Read more on a virtual machine here: brainly.com/question/12060797

#SPJ1

Complete Question:

Over time, you have noticed unauthorized configuration changes made to virtual machine cloud settings. You need a way to track who made these changes and when. What should you do?

A. Enable virtual machine API integration.

B. Rotate the cloud access keys.

C. Deploy an OSI layer 7 firewall.

D. Enable cloud resource activity auditing.

7 0
1 year ago
Under which menu option of a word processing program does a callout appear?
yuradex [85]
The TAB is INSERT and the MENU is SHAPES. I hope that this is the answer that you were looking for and it has helped you.
6 0
3 years ago
Read 2 more answers
FIRST AMSWER GETS BRAINLIEST! Select the correct answer. Bob is part of the design team in his office. The information that his
puteri [66]

Answer:

Creation of a logical system structure using the gathered information

Explanation:

8 0
3 years ago
Other questions:
  • Which function of a web page relies on responsive web design
    14·1 answer
  • The chart shows an example of a study-time survey. Students can use the formula shown in the survey to figure out ways to track
    14·1 answer
  • Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function howManyEve
    11·1 answer
  • Write a Python program that translates a binary number of n bits to a decimal number. Your program should first ask the user the
    8·1 answer
  • Write a program that asks the user to enter a student's name and 8 numeric tests scores (out of 100 for each test). The name wil
    13·1 answer
  • Which type of error occurred in the following lines of code?
    13·1 answer
  • Which of the following generally does not apply to all seven domains of an IT infrastructure? Incident response Service level ag
    10·1 answer
  • The wildcard character * (asterisk/start) and ? (question mark) are the same and can be use interchangeably.
    6·1 answer
  • What is bespoke software???​
    9·2 answers
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!