1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vekshin1
3 years ago
7

A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.a. Intrusion prevention sys

tem b. intrusion detection system c. defense-in-depth strategy d. quantitative risk assessment
Computers and Technology
1 answer:
Mila [183]3 years ago
8 0

Answer:b. intrusion detection system

Explanation:

An intrusion detection system (IDS)  helps to  alert  service administrators   to detect suspicious or malicious activity  by monitoring and analyzing  specific patterns to network traffic. Most times, the IDS may be configured  to  respond to suspicious malicious traffic by  blocking the cyber attacker making  such IP address unable to access that particular  network.

An intrusion detection system (IDS)  can be either a Host Based Intrusion Detection Systems (HIDS) or a Network Based Intrusion Detection Systems (NIDS) depending on preference by the user.

It is therefore necessary for  businesses who require high level of security   to adopt good and effective  intrusion detection systems so  that the communication of information from businesses to businesses  can be safeguarded and secure from cyber attacks.

You might be interested in
A file with a com extension is most likely to be a(n) ___ file.
olasank [31]
I think that the answer is: A executable
4 0
4 years ago
Read 2 more answers
Which if the following is an effect of intellectual property theft?
Leno4ka [110]
Record companies lose money because people download songs for free.
8 0
3 years ago
Read 2 more answers
Have y’all enjoyed The new hero floryn from Mobile legends
Angelina_Jolie [31]

Answer:

yo! but I'm a ex-mobile legends

5 0
3 years ago
In C++, objects instantiated on the stack must be returned to program memory through the explicit use of the delete keyword.
Lady_Fox [76]

Answer:

b. False.

Explanation:

Delete function not used to remove data stored on the stack. It is only used to free memory on the heap. The C++ is programming language used to develop operating systems.

8 0
3 years ago
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
Other questions:
  • Microsoft access does not create n:m relationships because microsoft access creates databases based on
    7·1 answer
  • Select all ways that databases may help you manage and manipulate data and records.
    11·1 answer
  • How does the teacher know you have completed your assignment in Google Classroom?
    12·1 answer
  • Which of the following statements is TRUE?
    11·1 answer
  • Space cushion includes
    8·2 answers
  • In order for the image tag in an HTML file to function properly, the file named square.png must be located where?
    5·2 answers
  • When is 1600 plus 25 and 1700 minus 35 the same thing?​
    10·1 answer
  • Gun to yo head any last words??
    10·2 answers
  • What is modularity?
    9·1 answer
  • Leon wants an output from his tablet. What should he look at?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!