1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yan [13]
3 years ago
13

A(n) ____ , a type of idps that is similar to the nidps, reviews the log files generated by servers, network devices, and even o

ther idpss.
Computers and Technology
1 answer:
kobusy [5.1K]3 years ago
8 0
An LFM IDPS

Using an LFM which stands for log file monitor, the system is able to review log files generated by servers, network devices, and even other idpss. Its main purpose is to look for signatures and patterns which might indicate that an intrusion is in the pipeline or has already happened.
This intrusion detection is enhanced due to the fact that LFM is in a position to look at several log files from different systems.




You might be interested in
What does it mean by the term versatility in computer world ​
Mnenie [13.5K]

Answer:

Versatility refers to the capability of a computer to perform different kinds of works with same accuracy and efficiency.

3 0
3 years ago
The ____ is composed of tabs, each containing groups of related commands.
Mashutka [201]
Ribbon im pretty sure is your answer
3 0
4 years ago
Should there be an agency in charge of the Internet? How would business, government, and education be impacted if the Internet w
aksik [14]
I believe the government should not be able to regulate or control the internet. The internet is a place to express and exchange new ideas. And when an agency or government starts to regulate the internet, they can prevent from view certain content.

There is something called net neutrality. Its definition can be found on Google, "the principle that Internet service providers should enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites." - Google

What that means is, that internet service providers (ISP's) should provide all content without discrimination. For example. There is two ISP's. ISP A and ISP B. ISP B does not practice net neutrality. So, when a customer has ISP B's service, he/she cannot view content from ISP A. Or whatever company or websites ISP B does not want you to view. On the contrary, ISP A practice net neutrality. ISP A provides all content for its customers. Even if ISP A doesn't like ISP B or any websites, it still allows their customers to view that content. 

I support for new neutrality. And so should you.
3 0
4 years ago
In the maintenance phase of the waterfall model, the parts of a program are brought together into a smoothly functioning whole,
vivado [14]

Answer:

False

Explanation:

The maintenance phase of the waterfall model for software development involves making changes to the entire system or some parts of it for improved performance. Integration and testing is the step at which  all units developed at the implementation stage are brought together to form a whole functioning system. At this stage, the system is constantly checked for proper functionality so it can be deployed.

7 0
3 years ago
1. Trust can be built in a relationship if:
artcher [175]

Answer:

A

Explanation:

because if both parties feel safe communicating and feel understood by the other party they feel safe trusting the other person and it develops a trust worthy relationship

4 0
3 years ago
Other questions:
  • You are given a network of 10.50.24.0/21, which contains 2,048 addresses. what subnet mask should you use to divide this into fo
    7·1 answer
  • Which if the following is an example of tangible property?
    7·1 answer
  • He ____________ may include a high-level WBS in a graphic chart format or as an indentured list of the work elements and associa
    14·1 answer
  • Simpson is trying to solve an equation related to converting a decimal number to its hexadecimal form. He decides to utilize the
    6·1 answer
  • 1. Show the 16-bit representation of the decimal number 2437. Show your steps. 2. Convert the 16-bit representation of part (a)
    12·1 answer
  • The emergence of MP3 (iPod) technology is an example of creative destruction because a. It is less expensive than compact discs
    14·1 answer
  • Please someone helpp
    12·2 answers
  • C++ Language Use functions to solve all problems in the mentioned assignment
    12·1 answer
  • Retail products are identified by their Universal Product Codes (UPCs). The most commonform of a UPC has 12 decimal digits: The
    8·1 answer
  • 3. Find the best.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!