1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
juin [17]
3 years ago
8

Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an examp

le of a _____________, ____________-based IDS/IPS.
Computers and Technology
2 answers:
pantera1 [17]3 years ago
4 0
The correct answer for this question is this one: "anomaly, network." <span>Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of an Anomaly, Network-based IDS/IPS.</span>
laiz [17]3 years ago
3 0

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


You might be interested in
What is required to control access to the file system using file and folder permissions on a windows based computer?
Elis [28]
NFTS-formatted partition.
5 0
3 years ago
Think of some local businesses that have websites. Look online and identify two different websites for businesses or services in
GenaCL600 [577]

Explanation:

Professional service-based businesses are well suited for the Internet, because the primary services they provide are information-based. A housecleaning or lawn care service business is not suited well for the Internet because the delivery of those services requires the provider to be physically present.

7 0
2 years ago
What executable programs have names that are just one character long, and what do they do??
12345 [234]
Any program can be an executable, and it can be named anything the user chooses, and would still function exactly the same.

PC games are often run via an executable. If you rename that executable to something else, it will still function perfectly fine.

Therefore, one character long executable programs are just executable programs that have been renamed one character long, and will function as intended.
5 0
3 years ago
HELP PLEASE NOW ASAP BRAINLIEST
charle [14.2K]
<span>Josie lives in an area where there are frequent power cuts. She should use a UPS (Uninterruptible Power Supply). It protects against damage to a computer's hard drive (data) in case of a sudden shutdown.

Hope this helps!</span>
7 0
3 years ago
Read 2 more answers
What is the answer to this?
Anit [1.1K]

Answer: I think the Valorous Unit Ribbon

Explanation: I don't really understand what's it asking but I sort of did to get this answer!

5 0
3 years ago
Other questions:
  • ___ are files of related records organized according to logical systems and stored on computer-accessible media.
    5·1 answer
  • That is Entrepreneur ? ?<br>​
    8·1 answer
  • Im trying to learn c# for unity does anyone know any good sources
    10·1 answer
  • In which part of a browser will you type the url of a website
    11·1 answer
  • 3. When you right-click a linked spreadsheet object, what commands do you choose to activate the Excel features?
    7·2 answers
  • Which of the following browsers was introduced with windows 10?
    10·1 answer
  • In the list [0, 13, 5.4, "integer"], which element is at index 2?
    11·1 answer
  • A student will not be allowed to sit in exam if his/her attendance is less than 75% .
    8·1 answer
  • HELP 100 points
    9·1 answer
  • Explain with examples the roles of system software and application software?<br>​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!