1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
7

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not

put a strain on client systems. Which of the following would BEST meet these requirements?
a. HIDS
b. NIDS
c. NIPS
d. HIPS
Computers and Technology
1 answer:
Ghella [55]3 years ago
3 0

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

You might be interested in
Python Question Class 11 attached below
snow_tiger [21]
math = 2-2/3+2/5-2/7+2/9
Print(math)
Simple as that tell me if im wrong its been a while since i didn’t do python
6 0
3 years ago
Which option is the default when creating appointments and meetings in a user’s own calendar as it relates to Free/Busy informat
Vlad1618 [11]

Answer:

C !

Explanation:

7 0
3 years ago
How to get an object from a container in java.
Vinil7 [7]
If it stores any type of objects mixed, use Object as storage class. All classes inherit from Object and for primitives use their respective wrapper classes. Or just use one of the bazillion container classes that already exist.
3 0
3 years ago
in a typical e-mail address, the "host" is A. an account designated by a user name B. CPU processor 2500 C. the receiver of an e
NISA [10]
The correct answer is A! :)
5 0
3 years ago
Read 2 more answers
Which of the following are incident priorities?
xenn [34]

Answer:

what are the options?

reply in comment so i can help:)

5 0
3 years ago
Other questions:
  • Si han visto el anime death note esta chido si no lo han visto veanlo es bien vacano
    6·1 answer
  • What is the program that searches through data bases?
    10·1 answer
  • Write programs with loops that compute:
    12·1 answer
  • A customer contacts the help disk stating a laptop does not remain charged for more than 30 minutes and will not charge more tha
    9·1 answer
  • What is a resume?A collection of all your professional and artistic works.A letter which explains why you want a particular job.
    6·1 answer
  • Write an application program in C++ to implement a class Fibonacci to print Fibonacci series upto N using member function series
    9·1 answer
  • The following code will not compile. Which of the options below would allow the code to compile and run as intended?
    9·1 answer
  • (python) Given the formula for conversion from Celsius to Fahrenheit
    10·1 answer
  • Hey someone who's willing to answer this question plz do. <br> I will give you all my points
    9·1 answer
  • What is one of the benefits of using a library in a program?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!