1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lara [203]
3 years ago
7

A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not

put a strain on client systems. Which of the following would BEST meet these requirements?
a. HIDS
b. NIDS
c. NIPS
d. HIPS
Computers and Technology
1 answer:
Ghella [55]3 years ago
3 0

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

You might be interested in
escribe and explain at least three improvements you think came about with the introduction of intrusion prevention technology. J
katrin2010 [14]

Answer:

Due to Brainly's policy on answering questions, posting links as "credible source." is prohibited, but you can let me know in case you'll still want to know the "credible source."

Explanation:

The three improvements you think came about with the introduction of intrusion prevention technology are:

1.The prevention of intruders from attacking the database

2.The data is protected and is more secured as the intruders are removed from the network.

3.The  data is not changed and misused as hackers cannot access it

The best feature which is can be termed as the most beneficial is that data is not changed neither can it be misused as the company's data is secured and protected from the outside world and the data can be used effectively and efficiently without any major changes.This means the company does not suffer any losses due to hacking of data.

8 0
3 years ago
Four ways to improve the performance of a hard disk include.
erik [133]

Answer:

Defragmenting, and optimizing, also on Windows to not use Paging unless you have an SSD. And to install a lightweight OS like Windows 11 super-lite, Linux etc.

7 0
2 years ago
In Shoreville, the last low tide was at 12:00 a.m. About what time will the next high tide occur?
Oliga [24]
6 pm they happen every 12 hours

4 0
3 years ago
Read 2 more answers
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
77julia77 [94]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
6 0
3 years ago
Read 2 more answers
Item 19 A student pushes a box across a rough horizontal floor. If the amount of work done by the student on the box is 100 J an
tatiyna

Answer:

60 J

Explanation:

Given,

Work done to push the box = 100 J

Energy dissipated by friction = 40 J.

According to work energy theorem work done is equal to change in kinetic energy.

Change in Kinetic energy = Work done by student + Work done by friction

Change in Kinetic energy = 100 J - 40 J

Work done by the friction will be negative because it will act in opposite direction of force applied.

Change in Kinetic energy = 60 J

4 0
4 years ago
Other questions:
  • Tim is in charge of the upcoming interschool baketball tournamnent. He wants to arrange all of the teams and their members in al
    15·1 answer
  • Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
    6·1 answer
  • Why do the holes at the top of parachutes make it go slower
    12·1 answer
  • Assume there is a variable, h that has already been assigned a positive integer value. Write the code necessary to compute the s
    9·1 answer
  • What is the difference between primary storage, secondary storage and off-line storage?
    5·1 answer
  • When a binary tree is full to its next to last level and its leaves on the last level are filled from left to right the tree is
    14·1 answer
  • Will technology be the destruction or salvation of human-kind
    13·2 answers
  • What are the main features cyber law of Nepal​
    13·1 answer
  • What program command saves a copy of a file under a different name
    14·1 answer
  • An international pharmaceutical company is fully compliant with local and international regulations. However, they suffered a ma
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!