1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
8

Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp

le of a _____________, ____________-based IDS/IPS.
Computers and Technology
2 answers:
pantera1 [17]3 years ago
4 0
The correct answer for this question is this one: "anomaly, network." <span>Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of an Anomaly, Network-based IDS/IPS.</span>
laiz [17]3 years ago
3 0

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


You might be interested in
Describe an application where a parallel circuit might work better than a series circuit.
PtichkaEL [24]

The application is electricity in the home.  Every light bulb, appliance,
and wall-outlet in your house is in parallel with all the others. 

If any electrical devices in your house were in series, then whenever
you turned any of those off, they would ALL go off. 

Also, the ones that needed the least power, like a night light, would get
the most, and the ones that needed the most power, like the refrigerator,
would get the least.

8 0
3 years ago
PLEASE HELP ASAP I WILL GIVE BRAINLIEST TO CORRECT ANSWER
salantis [7]
The correct answer is letter b
8 0
3 years ago
Read 2 more answers
A total stranger is trolling jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks ?
coldgirl [10]
A troll's main goal is to provoke a reaction from people, so I'd say the best way to stop the troll in his or her tracks would be to log off and not give the troll any satisfaction.

Then again, the troll might see you logging off as a win because he or she made you rage quit, so maybe replying with a quick "no u" to troll the troll before logging off would throw them off. That being said, the long term solution would still be not responding at all. After a while of no reactions the troll would most likely get bored.
8 0
3 years ago
Read 2 more answers
I am a bunch of large LANS spread out over several physical locations. Who am I?
Ivan

Answer:

You're WAN

Explanation:

Wide Area Network

8 0
3 years ago
Why team goals should be broken into shon-term, medium-term, and long-term goals
lora16 [44]

Answer:

Explanation: Goals should be broken down according to time because it allows the team to decide what their overall purpose is, and to define the actions that will allow them to achieve their overall purpose.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Under the common criteria, which term describes the user-generated specifications for security requirements?
    12·1 answer
  • What happens when you click the house icon on the right side of the screen?
    7·1 answer
  • What is used to determine when the communications channels are clear and when a device is free to transmit data
    6·1 answer
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • Implement a Java program using simple console input &amp; output and logical control structures such that the program prompts th
    15·1 answer
  • Which of the following are incident priorities?
    9·1 answer
  • Edhesive 4.6 lesson practice <br><br> Range is an example of a_______.
    10·2 answers
  • Choose all items that represent characteristics of HTML attributes.
    5·2 answers
  • To execute a command object and store the results in a dataset, you use the Group of answer choices Fill method of a data adapte
    5·1 answer
  • if we try to use tail-recursive rules to implement non-tail-recursive rules, it will normally result in rules that are
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!