1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mina [271]
3 years ago
8

An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans f

iles and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.
Computers and Technology
1 answer:
klio [65]3 years ago
8 0

Answer:

The main problem with such a tool would be resource usage

Explanation:

The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.

You might be interested in
……………………is one of the most popular cloud storage facilities.​
lord [1]
Chcgzrsfchvuvjbnkggvbbb.
4 0
3 years ago
A _______ is a collection of software routines that can be used by other software. Licensing terms for this type of software are
tensa zangetsu [6.8K]

Answer: library

Explanation:

A library refers to the collection of software routines that can be used by other software. Licensing terms for this type of software are important for programmers who use the software.

It is the collection of non-volatile resources that is used by computer programs, usually for the development of software.

8 0
3 years ago
What is the bleed space in a design?
pav-90 [236]

Answer:

The bleed is the part on the side of a document that gives the printer a small amount of space to account for movement of the paper, and design inconsistencies. Artwork and background colors often extend into the bleed area. After trimming, the bleed ensures that no unprinted edges occur in the final trimmed document.

Explanation:

8 0
3 years ago
Select the correct answer.
Svetradugi [14.3K]

Answer:

C. Universal

Explanation:

7 0
3 years ago
Why do designers of smartphones hide computer processing details from
geniusboy [140]

Answer:

b.you can focus on otherthings

6 0
2 years ago
Read 2 more answers
Other questions:
  • Melinda completed the Computer Programming Aptitude Test when she applied for a position with Beta Electronics. Six months later
    12·1 answer
  • ?an ip address reservation is made by creating an association between an ip address and what type of client identifier?
    7·1 answer
  • The device used to connect a network to the internet is called a
    7·1 answer
  • The term “gigahertz” refers to how many cycles per second? One thousand One hundred One billion One million
    7·1 answer
  • Routing protocols that enable routers to communicate beyond neighboring routers, allowing each router to independently map the n
    7·1 answer
  • Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than
    9·1 answer
  • )What item is at the front of the list after these statements are executed?
    8·1 answer
  • QUESTION 4 of 10: True or false: Paying for your ticket to a rock concert instead of a gym membership is an example of Opportuni
    9·1 answer
  • A discription of how child abuse displays itself on social media​
    6·1 answer
  • Which of the following is a document view you can select using Button on the status bar?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!