1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DaniilM [7]
4 years ago
12

Which feature of a network intrusion prevention system (NIPS) uses a lists of known bad IP addresses to protect the network?

Computers and Technology
1 answer:
mario62 [17]4 years ago
7 0

Answer:

Reputation based System

Explanation:

In this type of security system a file or IP address is classified as safe or unsafe based on the reputation, this can make unsafe conditions predictable and intrusion prevented with ease. it is easy to identify danger if the potential source of it is marked. This technology is usually employed by anti-virus softwares, anti-malwares, or other software systems that is used for security.

You might be interested in
When using a public computer or network, you should always _______. A. install a firewall. B. run an anti-virus program beforeha
SpyIntel [72]
Answer is c log out of any sites you have logged into ..bc it's a public computer
5 0
3 years ago
Read 2 more answers
Which of the selections below does not represent a workable ip address?
defon

Answer: C

Explanation:

Because ipv4 ip addresses will be 4 sets of numbers for a maximum of 255 per set ie.  The highest ipv4 number is 255.255.255.255 and the answer C has 293 in it.

6 0
4 years ago
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
cestrela7 [59]

Answer: Stealth scanning technique

Explanation:

Stealth scanning technique consist of the following types of scans :

1. FIN scan

2. X- MAS tree scan

3. NULL scan

The FIN scan responds by considering port open if response in received for its packet sent with the fin flag else considered closed.

The X-MAS tree scan fires up by setting a  TCP packet with URG, PUSH, FIN flags and the port is considered open if no response.

NULL scans sends null packet and considers it to be an open port.

Stealth scanning techniques considers to get some response from the network with out actually using a handshaking and is used to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic.

3 0
4 years ago
What’s a device that uses the measurement of a BIT?
Akimi4 [234]
A computer uses BIT. Hope this helps
5 0
3 years ago
If a user has just added a simple triangle shape into a diagram, how can the triangle be adjusted? Check all that apply. by maki
lesantik [10]
The first two make the most sense.
I hope this helps!
7 0
3 years ago
Read 2 more answers
Other questions:
  • We observe diffusion in nature and in our technology on a daily basis, but seldom stop to think about the physical process behin
    8·1 answer
  • A data structure used to bind an authenticated individual to a public key is the definition of ________.
    14·1 answer
  • Jacob is a website designer. Whenever his company takes on a new project, Jacob takes the initiative and comes up with ideas and
    12·1 answer
  • Playstation network live updates pes 2018 does it cost extra
    13·1 answer
  • Needed urgently what are short cut keys
    8·2 answers
  • Where do you find the instructions, learning objectives, evaluation and scoring for this aba assignment?.
    15·1 answer
  • You have been trying all day to check your direct messages on social media. The site is really slow to load and sometimes you ca
    13·1 answer
  • Can yall help me pls
    12·1 answer
  • A designer wraps up a final prototype of a language learning app in Adobe XD, and wants to share their work with the development
    10·1 answer
  • What are web site and web page?​
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!