1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
12

A technician has installed an IPS appliance on the network. Which of the following is the purpose of that installation?

Computers and Technology
1 answer:
Scrat [10]3 years ago
5 0

Answer:

B

Explanation:

Stands for "Intrusion Prevention System." An IPS is a network security system designed to prevent malicious activity within a network. It is often used in combination with a network detection system (IDS) and may also be called an intrusion detection and prevention system (IDPS).

Like an IDS, an IPS may include hardware, software, or both. It may also be configured for a network or a single system. However, unlike IDSes, intrusion prevention systems are designed to prevent malicious activity, rather than simply detecting it.

When an IDS detects suspicious activity, such as numerous failed login attempts, it may log the IP address. If it detects a suspicious data transfer, it may check the packets against a database of known viruses to see if any any malicious code is being transferred. When an intrusion detected, an IDS compares the activity to a set of rules designed to prevent malicious activities from taking place. For example, when an IDS detects numerous failed logins, it may block the IP address from accessing any network devices. If it detects a virus, the data may be quarantined or deleted before it reaches its destination.

Examples of hardware-based IPSes include Cisco's IPS 4500 Series, IBM's Security Network "GX" systems, and HP's TippingPoint "NX" devices. Software IPS solutions include Check Point's IPS Software Blade and McAfee's Host Intrusion for Desktop.

-techterms.com

You might be interested in
The two types of objects responsible for collecting data are
andrezito [222]
Hey there,
The answer is <span>tables and forms

Hope this helps :))

~Top
</span>
7 0
2 years ago
In a word processor, Tariq chooses Options from the Tools menu and then selects the Track Changes tab. Which of the following ta
bearhunter [10]

Highlight Changes

Compare Documents

3 0
3 years ago
A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
Lynna [10]

Answer:

vulnerability, risk

Explanation:

A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.

6 0
3 years ago
What do workspaces allow a company to do?
erica [24]

Answer:

The answer to this question is given below in the explanation section. The correct answer is A.

Explanation:

The correct answer to this question is:

They restrict access depending on job role.

because the company creates different workspaces for particular departments. Each department allows access to its employee to work and use the assigned resources. Other people from other departments can't use their computers due to security reasons.

However, the following options are not correct.

They connect a company's website with its internal wiki.

They allow a company to organize information. (information is maintained inside in the workspace)

They provide a platform for collaboration.

8 0
2 years ago
Help it's the last question quickkk​
aniked [119]
I would say the answer is b, but ⟟ might be wrong
7 0
3 years ago
Other questions:
  • The layout button is located in the ____ group on the home tab?
    14·1 answer
  • What's another name for the Super High shot, if you shot it on the ground using a tripod?
    14·1 answer
  • What component of a motherboard is not considered to be a field replaceable unit?
    12·1 answer
  • Mr. Green maintains a spreadsheet containing data on all of his employees, including name, job profile, monthly salary, and home
    15·1 answer
  • Discuss the different types of user-friendly interfaces and the types of users who typically use each.
    12·1 answer
  • An ISP is considering adding additional redundant connections to its network. Which of
    5·1 answer
  • What does NCR stand for
    12·2 answers
  • What is the difference between KE an PE
    8·1 answer
  • Microsoft word 2010 lab 6-1
    7·2 answers
  • Is this even possible
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!