True/False
- Traffic that is encrypted will typically pass by an intrusionprevention system untouched.
- Performing cloud-based data loss prevention (DLP) is as simpleas moving the enterprise edge methodology to the cloud.
- General UNIX baselining follows similar concepts as baseliningfor Windows OSs.
- Defense against attack begins by eliminating threats.
- A worm is malicious code that has to attach itself to somethingelse to survive.
- With the availability of DNS blacklisting, pattern matching isno longer utilized for filtering spam.
- Sender Policy Framework (SPF) validates the receiving addressof the e-mail.
- S/MIME uses the X.509 format for certificates
Multiple choice
9. What is an advantage of a network-based IDS? he differencesbetween misuse and anomaly IDS models
OR
OR