1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
6

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi

fy intruders and to protect against suspicious network traffic which attempts to access files and data?A. Interconnected data software (IDS)B. Intrusion detection software (IDS)C. Security Information system (SIS)D. Internet detection scanner (IDS)
Computers and Technology
1 answer:
kvasek [131]3 years ago
3 0

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

You might be interested in
4.2.10: Multiplication Table: Create a program using a for loop which will print out the 4’s times table through 10.
nordsb [41]

I included my code in the picture below. Best of luck.

6 0
3 years ago
Microsoft is interested in customers' perceptions of Windows 8, its new PC operating system. Since the research goal is rather s
Fantom [35]

Answer:

The answer is "Option c"

Explanation:

An Online questionnaire is a research study, that can be conducted across the internet by the targeted audience. It is the primary use for web-based ways to store feedback, and analyses by statistical apps and other choices were wrong, which can be described as follows:

  • In option a, It is wrong because experimental is used in factor manipulation.
  • In option b, It is not a secondary part of survey, that's why it is incorrect.
  • Option d and Options e is used to in survey, but it's not correct.  

5 0
3 years ago
Which of the following are characteristics of centralized version control systems? Select 3 options.
alex41 [277]

Answer:

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

Explanation:

The two main types of version control system are the centralized version control system and distributed control system

The centralized version control system is a control system whereby all programmers work on and make their individual changes to a single single copy of the project stored and maintained in a central repository, such as a server

In order to solve the problem of several developers working on each others work simultaneously, a centralized version control system makes use of the lock-modify-unlock model

The three options are therefore;

It allows many developers to work on the same project from anywhere at the same time

Project files are maintained in a central repository

The process may require file locking, depending on file type

6 0
3 years ago
Describe two ways that using frames helps move data along a network
Helen [10]
Frames move bigger amounts of data through the network thus making it faster.
3 0
3 years ago
Notice that the iris.target array contains 3 different labels. Create a plot that you think is interesting using the data from t
Alexeev081 [22]

Answer:

from sklearn.datasets import load_iris

import seaborn as sns

import pandas as pd

data = load_iris()

final_data = data.data[:]

final_data = pd.DataFrame(final_data)

final_data.columns = ['SepalLengthCm', 'SepalWidthCm', 'PetalLengthCm', 'PetalWidthCm']

species = data.target[:]

final_data['Species'] = species

sns.pairplot(final_data, hue='Species')

Explanation:

8 0
3 years ago
Other questions:
  • R15. Suppose there are three routers between a source host and a destination host. Ignoring fragmentation, an IP datagram sent f
    8·1 answer
  • What is a fragment shader? Question 5 (3 marks) What is trilinear filtering?
    8·1 answer
  • What are three situations when recursion is the only option available to address problems?
    10·1 answer
  • Pick the two statements about packets and routing on the Internet which are true. a. Packets travelling across the Internet take
    13·1 answer
  • I want to know that what is virtually mean can you please help me out
    10·1 answer
  • A company wants to inform a select list of it's regular customers about a flash sale. Which type of platform will it use to send
    9·1 answer
  • Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natura
    6·1 answer
  • What is combo chart ? how will you created a combo chart​
    11·2 answers
  • Who wants 100 points? comment buh. i don't rlly care buh.
    15·2 answers
  • What three-key sequence will bring up the task manager or allow a user to log off or restart the computer?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!