Answer:
Signature-based IDS.
Explanation:
IDS is an acronym for intrusion detection system and it can be defined as a security system which is typically used to monitor network traffic and it notifies the engineer when there's a malicious activity.
Generally, the detection methods used by the Intrusion Detection Systems (IDS) are;
1. Statistical anomaly-based detection.
2. Stateful protocol analysis detection.
3. Signature-based detection.
In this scenario, your manager wants you to implement a type of intrusion detection system (IDS) that can be matched to certain types of traffic patterns. Thus, this kind of IDS is known as a signature-based IDS.
A signature-based detection system refers to a type of detection and protection system used to detect a malicious attack such as a worm, virus, trojan, malware etc., by checking and matching them with a repository of specific signatures, patterns or fingerprints.
Answer: a Star NetNetwork Topology
Answer:
<u>The correct answer is B. The use of an analog modem to transmit data over voice telephone lines.</u>
Explanation:
<u>Dial-up</u> is the oldest Internet connection method and was the only one used when the Internet took its first steps. Access is made by the user through an analog modem and a conventional telephone line. It is less and less used, since the data transmission capacity does not exceed 56 kbps, which makes navigation very slow, unstable and keeps the telephone line busy when connected to the internet. With the popularization of broadband access services and their very affordable prices, <u>dial-up</u> access is virtually obsolete.