1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
6

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi

fy intruders and to protect against suspicious network traffic which attempts to access files and data?A. Interconnected data software (IDS)B. Intrusion detection software (IDS)C. Security Information system (SIS)D. Internet detection scanner (IDS)
Computers and Technology
1 answer:
kvasek [131]3 years ago
3 0

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

You might be interested in
How to download ram<br> my computer is very slow and I need more ram
AURORKA [14]

Answer:

It is not possible to download RAM onto your computer.

Explanation:

RAM (Random-Access Memory) are physical objects installed onto your computer in the form of some sort of chip. Please do not attempt to download RAM from the internet, you may end up with malicious software on your computer. The only way to get more RAM is by installing more onto your computer or by looking at guides that can explain how to free up some RAM that may already be in use by an application.

8 0
3 years ago
Read 2 more answers
4. How can a document's organization help us better understand the document's purpose?​
Ad libitum [116K]

Answer:

a document organization can help because it's organized and easy to read on a document.

6 0
2 years ago
_ is the use of a collection of computers, often owned by many people or different organizations, to work in a coordinated manne
ddd [48]

Answer:

"Grid computing" is the correct answer for the above question.

Explanation:

  • Grid computing is a process in which many computers are participating to solve a single problem. This type of process is distributed multiple computers to perform a different type of task.
  • If there is large problem and if many computers solve that problem, then that problem is solved easily within a few minutes.
  • This is because many computers are working for that problem.
  • The above question asked about that process in which many computers are working to solve a single problem. This processor is known as "Grid Computing".
8 0
3 years ago
Soldering is a method of
babymother [125]

Answer:

Is a process in which two or more metal items are joined together by melting

Explanation:

: )

4 0
3 years ago
Read 2 more answers
Following a decrease in international demand, the management at a publishing firm reduces the budget of the print media division
polet [3.4K]

Answer:

intergroup

Explanation:

Intergroup conflict refers to disagreements that exist between two or more groups and their respective members. However, this can also reflect any type of formal or informal disagreements between varying groups such as political parties or activist groups.

Cheers

3 0
3 years ago
Other questions:
  • Use System.DateTime along with System.Console to implement a simple C# program that does the following:_______.
    5·1 answer
  • After class, Anita and Bev make plans to study for their psychology exam together but cannot decide on a time or location. In ad
    14·1 answer
  • Working at a ski resort in the mountains has its own unique security issues. Kenny is the chief information officer for Sundance
    10·1 answer
  • Write a program that uses two input statements to get two words as input. Then, print the words on one line separated by a space
    11·1 answer
  • Write an algorithm and draw flowchart to print 30 terms in the following sequence
    13·1 answer
  • Does any of yall know how to delete your account?
    10·1 answer
  • What are two advantages of a pay-for-use online conferencing service compared to a free service? (Choose two)
    5·1 answer
  • When assigning a value to a string, which of the following rules needs to be followed?
    8·1 answer
  • Code is the code or instructions used to create a Web page or<br> program.
    15·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!