Multiple choice
1. What is an advantage of a network-based IDS? he differencesbetween misuse and anomaly IDS models is
A. An IDS can examine data after it has been decrypted.
B. An IDS coverage requires fewer systems.
C. An IDS can be very application specific.
D. An IDS can determine whether or not an alarm may impact thatspecific system.
2. __________ systems are a combination of hardware and softwaredesigned to classify and analyze security data from numeroussources.
A. Port scanning
B. Honeypot
C. Network security monitoring (NSM)
D. Security information and event management (SIEM)
3. Which term refers to the quarantine or isolation of a systemfrom its surroundings?
A. Demilitarized zoning
B. Read-only
OR
OR