1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ryzh [129]
3 years ago
6

Which of the following systems is designed with full-time monitoring tools that search for patterns in network traffic to identi

fy intruders and to protect against suspicious network traffic which attempts to access files and data?A. Interconnected data software (IDS)B. Intrusion detection software (IDS)C. Security Information system (SIS)D. Internet detection scanner (IDS)
Computers and Technology
1 answer:
kvasek [131]3 years ago
3 0

Answer:

B. Intrusion Detection Software (IDS)

Explanation:

An Intrusion Detection Software (IDS) is designed to monitor all inbound and outbound network activity and identify any suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. IDS is considered to be a passive-monitoring system, since the main function of an IDS  product is to warn you of suspicious activity taking place − not prevent them. An IDS essentially reviews your network traffic and data and will identify probes, attacks, exploits and other vulnerabilities. IDSs can respond to the suspicious event in one of several ways, which includes displaying an alert, logging the event or even paging an administrator. In some cases the IDS may be prompted to reconfigure the network to reduce the effects of the suspicious intrusion.

You might be interested in
The expressions in each part of an AND or OR expression use ________ evaluation; that is, they are evaluated only as much as nec
I am Lyosha [343]

Answer:

The expressions in each part of an AND or OR expression use <u>Short Circuit</u> evaluation; that is, they are evaluated only as much as necessary to determine whether the entire expression is true or false.

Explanation:

Logic operations follow different type of evaluation methods that can be short circuit or open circuit evaluation. In short circuit evaluation if first operand of the expression is true or false in OR or AND operation respectively, the result will found as true or false without checking the second operand of the expression. This is called Short Circuit Evaluation.

In OR operation, If first operand is true it means that the result of the expression is true without knowing that the other operand is true or false. In AND operation, If the first operand is False, the result will found as False without knowing that whether the 2nd operand is  true or false.

This Mechanism is called Short Circuit Evaluation.

4 0
3 years ago
Which type of computer serves as the heart of the computing systems for many, perhaps most, major corporations and government ag
Nezavi [6.7K]

Answer:

Mainframes

Explanation:

Mainframes are utilized by many major corporations and government agencies. They are also used in banking, accounting, and healthcare to name a few.

4 0
2 years ago
What's the main idea??
tatyana61 [14]
My computer wont let me download this pdf

7 0
3 years ago
someone who protects valuable online information, like phone numbers and passwords would be considered​
charle [14.2K]

Answer: i believe a digital citizen

i am not 100% sure about that answer but i reaserached a little and thats what i found :)

I hope this helps u out a little a thank and a brainlist would be greatly appreciatecd :)

6 0
3 years ago
Weakness in software can be more quickly uncovered and exploited with new software tools and techniques.
grandymaker [24]
False because it might damage it more but if it was recommended by lots of people i mean the software then its true
6 0
3 years ago
Other questions:
  • What are the main purposes of regulatory policies? Check all that apply.
    5·2 answers
  • How do you insert a new row into a worksheet
    5·1 answer
  • Meaning of page break​
    8·1 answer
  • What is the best brand of folders
    13·2 answers
  • Stuart wants to delete some text from a slide. What should Stuart do?
    8·1 answer
  • What mistake might you make related to changing the data in a cell that's used in a formula?
    14·1 answer
  • How to use access?<br> like working in access and bringing tables and stuff
    5·1 answer
  • Data from RAM may be placed where to free up space? Log file Swap file Word file Print spool file
    10·1 answer
  • Which of the following is NOT AN EXAMPLE of personal identifying
    9·2 answers
  • If you want to join all of the rows in the first table of a SELECT statement with just the matched rows in a second table, you u
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!