1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
abruzzese [7]
4 years ago
8

Which security technology inspects network traffic, attempting to find matches to suspected malicious or unauthorized activity b

ased on the content of the packets, and is limited to being able to only log or send alerts on that malicious activity?
Computers and Technology
1 answer:
astraxan [27]4 years ago
3 0

Answer:

Intrusion Detection System (IDS)

Explanation:

An Intrustion Detection System (IDS) is an application software or hardware device that monitors network traffics or systems. It searches the network or system for threats. These threats could be (but not limited to) suspicious activities or malicious activities or policy violations.

Once a threat is observed, it beeps or alerts the system administrator(s). Also, all these threats are then logged in a security information and event management (SIEM) system.

But an IDS cannot block or prevent threats on the system.

You might be interested in
Employees at the Red Bluff Golf Club & Pro Shop have the opportunity to become certified trainers if they log enough hours.
vodka [1.7K]

Answer:

Following are the solution to this question:

Explanation:

Some of the data is missing in the question, which is defined in the attached file. Please find it.

Follows are the formula which is used in the question:

  • EmployeeAnalysis Worksheet IF(C5>49,"Certified","Not Certified")
  • Transactions Worksheet IF(F10="No","",0.07)

In the first condition, it checks "C5" is greater than 49 if the condition is true, it will give "Certified" otherwise, it will give "Not Certified".

In the second condition, it checks "F10" is equal to "No" if the condition is true, it will give a blank or space otherwise, it will give "0.07".

3 0
3 years ago
An Oven Is Just A Spicy Refrigerator? Yes Or No??
Marianna [84]

Answer:

No

Explanation:They both have different actions

3 0
3 years ago
Read 2 more answers
What is the best java 3d modeler library?
LenaWriter [7]
I believe its "Thinking Universe"
5 0
4 years ago
Write an algorithm which gets a number A, if it is even, prints even, and if it is odd prints odd.
juin [17]

Answer:

The algorithm to find A is even or odd.

  1. input A.
  2. Check the remainder on diving by 2 by A%2.
  3. If remainder is 1 then A is odd Print(Odd).
  4. If remainder is 0 print(Even).

Explanation:

To check if the number is even or odd we use modulo  operator(%).Which gives the remainder on dividing.So if we do this A%2 it will give the remainder that will come out on dividing the value of A by 2.

So if the remainder comes out is 1 then the number is odd and if the remainder is 0 then the number is odd.

7 0
4 years ago
Erin previously recorded all of her credit card activity manually using the expense transaction screen. She then reconciled the
-Dominant- [34]

Answer:

she should select reconciled account, then select batch actions and lastly exclude selected

Explanation:

Erin should reconcile her account if she cannot see the matches for the transactions that she entered and reconciled previously.

Banks use reconciliation methods to evaluate the transactions that are reported internally against monthly financial statements.

Erin has to take these steps:

Select reconciled transactions, then select batch actions and lastly exclude selected ones

4 0
3 years ago
Other questions:
  • Judy forgot where she saved a certain file on her computer. Therefor, she searches for all files with a jpg file extension. Whic
    11·2 answers
  • In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
    11·1 answer
  • 2. A body is thrown vertically<br>100 m/s Theme taken to retum​
    13·1 answer
  • Jessica finds out that the government introduced a new trade policy that will increase import tariffs. She calls for a meeting o
    15·1 answer
  • Question 5 (10 points)
    12·1 answer
  • Advantages of purchasing a software package over developing software in-house include all of the following except ____. Group of
    13·1 answer
  • A formal log-on procedure is the operating system’s last line of defense against unauthorized access.
    10·1 answer
  • Consider a system consisting of processes P1 , P2 , ..., Pn , each of which has a unique priority number. Write a monitor that a
    14·1 answer
  • Explain what an IM is, and what is the technology shown in the accompanying figure
    7·2 answers
  • What does the 7 C s stand in communication skill​
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!