1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
10

How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more

on analyzing incoming traffic, while an HIDS monitors valuable OS filesan NIDS recognizes troubling patterns, while an HIDS is not capable of doing thisan HIDS focuses more on analyzing incoming traffic, while an NIDS monitors valuable OS filesan HIDS recognizes troubling patterns, while a NIDS is not capable of doing this
Computers and Technology
1 answer:
balandron [24]3 years ago
3 0

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

You might be interested in
A typical setup for a ____ network would include computer users sharing a single internet connection.
konstantin123 [22]
Could be 'home or work' or intranet. Not enough context to answer any better.
3 0
4 years ago
Solesbee v. Balkcom (1950) was one of two cases that challenged the constitutionality of capital punishment prior to 1968. What
Karo-lina-s [1.5K]

Answer:

Whether a governor is allowed to determine an inmates sanity where finding an inmate insane would prevent his or her execution

Explanation:

The Solesbee v. Balkcom (1950) was a case where a state in its policy was against the execution of convicts who goes insane after being convicted and sentenced. According to this case, under the Fourteenth Amendment, such is not considered denial of due process if the governor is vested with the power to determine if a convict is insane after sentence or not, and if he is actually insane, a governor should be the one to say if the convict is to put in an insane asylum.

4 0
3 years ago
Arman takes a picture with his smartphone which he subsequently posts online. Beatrice finds the picture online and posts a copy
KatRina [158]

Answer:C

Explanation:

5 0
3 years ago
Which is true about routers and switches?
Pepsi [2]

Answer:

Routers control traffic between networks while switches control traffic within a network

Explanation:

Router and switches both are used to control the traffic. In local area network, different computer are connected with each other with in the organization or network. Switch is used to connect all the computers or devices in the local area network (LAN). The switch is responsible for connecting all the computers in the LAN and controlling the traffic within the LAN network.

On the other hand, Wide Area Network (WAN) is consist of multiple number of  Local Area Networks (LANs). To connect all the LAN router is used. Router is responsible for connecting all the networks in the WAN and also responsible for controlling traffic between different networks.

5 0
3 years ago
Which creepy character is a user-generated myth in minecraft
horsena [70]
It would be slender man
7 0
3 years ago
Other questions:
  • Is the percentage of the original sample that successfully completed a survey.
    10·1 answer
  • What technology would it take to make a balloon that doesn't pop?
    6·1 answer
  • Which principle suggests that specific single responsibility interfaces are better than one general purpose interface?
    13·1 answer
  • Network administrators use _______ technology to get antivirus updates to be automatically downloaded on employees' workstations
    15·1 answer
  • Ten examples of an interpreter
    8·1 answer
  • What is the answer ?? plz help
    9·1 answer
  • What is the missing line?
    9·1 answer
  • How can computational thinking techniques be applied to software development
    6·1 answer
  • What would this look like if you were to write the pseudocode but for c++?
    5·1 answer
  • Write the program to accept the radius of circle and find its diameter coding
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!