1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
13

A network administrator was testing an IPS device by releasing multiple packets into the network. The administrator examined the

log and noticed that a group of alarms were generated by the IPS that identified normal user traffic. Which term describes this group of alarms?
a) true negative
b) true positive
c) false positive
d) false negative
Computers and Technology
2 answers:
kipiarov [429]3 years ago
8 0

Answer:

c) false positive

Explanation:

An event signaling to produce an alarm when no attack has taken place. False positives are mislabeled security alerts, indicating there is a threat when in actuality, there isn’t. By default, most security teams are conditioned to ignore false positives, In the event of a false positive an IPS will actively stop the normal activity which is likely to negatively impact business functions.

alina1380 [7]3 years ago
5 0

Answer:

C. False positive.

Explanation:

Penetration testing or pen test is a mechanism used by organisation to test or check for vulnerabilities attackers could exploit in their private network. This process is vital for strengthen the security policies of an organisation's network.

There are several types of penetration testing that can be used, they are blind testing, black box testing, white box testing, internal and external testing etc. Several packets and protocols are tested to ensure a secure network. when a test is done, an alarm is given to notify the tester of the current status. The false positive alarm is seen when a normal user traffic is detected but gives off false negative when the case is reverse.

You might be interested in
They have outlined their technical needs and have sent some of the documentation along with the potential provider's SLAs and te
iren2701 [21]

Answer:

A concern that might be expressed by the legal department after reviewing the SLAs and terms of service is:

c. Ensuring that there is a guarantee that the cloud service provider will provide notice in the event that they decide to discontinue operations.

Explanation:

The SLA that the legal department will review should include a description of the services to be provided, expected service levels, measurement metrics for each service, each party's duties and responsibilities, and the contract remedies or penalties for breach, among others.  But the legal department will be mostly concerned with legal remedies during breaches, liability limitation and warranties, and intellectual property protection issues than with more technical issues.  This is despite the fact that all the terms of the SLA will be diligently reviewed by the legal department.

7 0
3 years ago
Please explain what steps you will take to prevent hackers from getting access to your personal information.
yuradex [85]
The steps I would take are 1. Making a strong password with symbols and numbers. 2. I will set up a 2 way authentication ther for if someone would be trying to hack me I would get an alert in order to stop the attempt. 3 I will not use the same password each time.
4 0
3 years ago
Which of the following is an example of an open-ended question?
Tpy6a [65]

Answer:

<em>What are your thoughts about this?</em>

Explanation:

A question that can be answered with yes or no is a closed question.

4 0
3 years ago
Assume that you are working with spreadsheets, word processing documents, presentation slides, images, and sound files for a sch
dybincka [34]

Answer:

See explanation below.

Explanation:

File organization is very important especially when one is working with numerous files from different applications.

When you are working with spreadsheets, word processing documents, presentation slides, images and sound files, it is important to create folders and sub-folders to make locating your files a lot easier.

  1. Make sure you have all your files saved with names that are relevant to your school project.
  2. Create a sub-folder to store all spreadsheets files, create a sub-folder to store all word processing files, create a sub-folder to store all presentation slides and create another folder to store images and sound files. You do this to make it easy for you to locate whichever file you want.
  3. You create the sub-folder by right clicking on your documents section and clicking on new folder. Type in the name of the folder and save.
  4. After creating sub-folders,  create a general folder for all your folders by using the same method in step 3. Copy all your sub-folders into this major folder. You can name this folder the name of your school project.

This way, you never have to look for any files for your school project.

6 0
3 years ago
What is a trojan horse in computer science?
Firdavs [7]

Answer:

type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems.

Explanation its malware

4 0
3 years ago
Other questions:
  • You have found an old dusty computer in your basement that you can identify as an original IBM PC. You ask your friend if he kno
    13·1 answer
  • You must. place a child in a federally approved child restraint device. if the child is
    5·2 answers
  • Courses that enable students to begin jobs that require course completion certificates are know as
    8·1 answer
  • What is the work of the cpu as processer
    6·2 answers
  • Which company was the first to develop personal computers?
    6·1 answer
  • Here is the problem specification: An Internet service provider has three different subscription packages for its customers: Pac
    5·1 answer
  • Write a program that (a) generates a vector with 20 random integer elements with integers between -29 and 30, (b) replaces all t
    13·1 answer
  • Previous
    11·1 answer
  • How do I fix when it hits the second session it skips scanf.
    6·1 answer
  • Kevin would like to ensure that his software runs on a platform that is able to expand and contract as needs change. Which one o
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!