1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
6

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi

fy intruders and to protect against suspicious network traffic which attempts to access files and data?A. Interconnected data software (IDS)B. Intrusion detection software (IDS)C. Security Information system (SIS)D. Internet detection scanner (IDS)
Computers and Technology
1 answer:
kvasek [131]3 years ago
3 0

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

You might be interested in
How would a designer interpret the word denier?
xxMikexx [17]

Answer:Denier is a unit of measurement that is used to determine the fiber thickness of individual threads or filaments used in the creation of textiles and fabrics. Fabrics with a high denier count tend to be thick, sturdy, and durable. Fabrics with a low denier count tend to be sheer, soft, and silky.

Explanation:

idk if this is right.

7 0
3 years ago
Read 2 more answers
A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
irina [24]

Answer: Phishing

Explanation:

Phishing is a form of identity theft involving phony email messages asking customers to update credit, debit, cards, accounts passwords, and all whole of personal information. It is still one of the relevant form of identity theft whereby personal information is taken away in form of electronic communication or messages.

One example could be when a person receives a mail from xyz.com and ask him/her to click on a page. upon clicking on it the person will be redirected to another page. in that page several details would be there such as username and password, bank account details. So once all these details are entered in the web page all our personnel information will leaked into the servers of the hackers and could lead to serious troubles. Sometimes phishing is also in form of fake social networking website which resembles exactly to that of the original one.

So Phishing is a for of identity theft.

3 0
3 years ago
Which does plug-and-play refer to?
vlabodo [156]
The answer is c the ability for the os to detect
7 0
3 years ago
A _____ is a valuable tool that enables a user to find information on the Web by specifying words or phrases known as keywords,
svetoff [14.1K]

Answer:

Search Engine

Explanation:

A search engine refers to a computer application software that looks through and locates items in a database. These items will correspond to to the phrases or keywords being searched for that has been entered by a user.

On the internet or web, popular search engines are provided by google and yahoo and they are designed to carryout web search when users enter search query as keywords or phrases

8 0
3 years ago
Read 2 more answers
Which of the following is most likely to be considered plagiarism? a. Intentionally reporting the results of inaccurate statisti
Svetlanka [38]

Answer:

c.

Explanation:

Plagiarism refers to the act of stealing another person's thought, ideas, or expressions. Therefore it can be said that out of all the answers provided the one that is most likely to be considered plagiarism would be using materials from a source without proper citation. This is because you are using another individual's work and not giving them credit for having created that work, instead you are taking credit for it by not citing the actual author.

4 0
3 years ago
Other questions:
  • ​printers, monitors,​ tablets, cpus, and laptops are examples of​ ____________.
    14·1 answer
  • Samantha plans an investigation in which she will study a population of animals. Which of these answers best describes the focus
    8·1 answer
  • If the physical memory size is doubled without changing any of its other parameters, the number of entries in the page table
    5·1 answer
  • Which amendment to the Constitution ended slavery in the United States?
    8·1 answer
  • I will upvote....
    10·1 answer
  • __________ contain(s) remnants of word processing documents, e-mails, Internet browsing activity, database entries, and almost a
    9·1 answer
  • is a measurement that quantifies how much information can be transmitted over the network. A. Memory B. DMZ C. Bandwidth D. Clou
    10·1 answer
  • Who is tim berners-lee
    14·2 answers
  • I know I'm asking for a lot. But this is my last question. If we do it I pass my semester. help please.
    15·1 answer
  • Alayna is researching information online to write her essay about the Berlin Wall.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!