Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of a _____________, ____________-based IDS/IPS.

Answers

Answer 1
Answer:

Is an example of reactive, signature based IDS/IPS

Reactive, signature based IDPS technology is one of the many methodologies used to detect attacks. In a signature based IDS, a misuse detection identifies intrusions by watching for patterns of traffic and compare them against observed events or a database of signatures from known threats. Reactive IDS/IPS, on the other hand, will not only detect and alert malicious traffic but also take pre-defined proactive actions. Using MRTG, Ntop, and SNMPC in routers will monitor traffic and help network managers easily see issues like DOS attacks and security problems.


Answer 2
Answer: The correct answer for this question is this one: "anomaly, network." Using MRTG, Ntop, and SNMPC to collect flow data from your routers and switches to identify traffic/packet anomalies is an example of an Anomaly, Network-based IDS/IPS.

Related Questions

true/false: if the last line in a file is not terminated with a \n, the readline method will return the line without a \n.
In the context of information privacy, which of the following is true of cookies? A. They record users' actions on a Web site. B. They get saved on a computers' primary memory. C. They provide information about users' location. D. They make it impossible for Web sites to customize pages for users.
In five to ten sentences, explain what netiquette is and how it improves efficiency and productivity in the workplace.
What type of malware is heavily dependent on a user in order to spread?
What is printed by the following program? var numApples = 10; var numOranges = 5; if(numApples < 20 || numOranges == numApples){ println("Hello, we are open!"); } else { println("Sorry, we are closed!"); } println("Sincerely, the grocery store");

Consider the following code snippet: String[] data = { "abc", "def", "ghi", "jkl" }; String [] data2; In Java 6 and later, which statement copies the data array to the data2 array?

Answers

Answer:

String[] data2 = Arrays.copyOf(data, 4); is the statement which copies the data array to the data2 array in java 6 .

Explanation:

The Arrays.copyOf() function copies the data from first array to another array in java .We pass the two argument in this function  first argument is the name of first array and second the length of first array .

Following are the program in java  

import java.util.Arrays; // import package  

public class Main

{

public static void main(String[] args) // main function

{

String[] data = { "abc", "def", "ghi", "jkl" }; // string declaration

// printing the array data1

 System.out.println("before copy new array:");

 for (int k = 0; k < data.length; k++)  

     {

 System.out.println(data[k]);

 }

String[] data2 = Arrays.copyOf(data, 4);

 // printing the array data2

     System.out.println("after copy new array:");

     for (int k = 0; k < data2.length; k++)  

     {

        System.out.println(data2[k]);

     }}}

Output:

before copy new array:

abc

def

ghi

jkl

after copy new array:

abc

def

ghi

jkl

A policeman's whistle has a
A.high pitch
B.low amplitude
C.low pitch

Answers

The whistle will have a high pitch

PLEASE ASAP!!Network risk analysts typically have a college or university degree in psychology or sociology.

True or False

Answers

False

They usually have a degree in computer science or computer programming

Answer:

True

Explanation:

edg2021

Network risk analysts work with corporations to determine the threat of cybercrime and terrorism in their network systems. This includes a behavioral analysis of employees. The ideal candidate would have a background in psychology and/or sociology as well as experience working in the field of network security.

When viewing data entered into a spreadsheet, the columns identify _____.?

Answers

the answer is : variables
When viewing data entered into a spreadsheet, the columns identify Variable. The variables later can be used on a formula to help you process any sort of data that is implemented within excels' formula system

Microsoft Excel ______ give a visual representation of data that can make the data easier to understand.worksheets
workbooks
spreadsheets
ch21

Answers

spreadsheets......................

Answer:

Charts

Explanation:

i dont know why but odyssey ware says it is

A user has been given Full Control permission to a shared folder. The user has been given Modify permission at the NTFS level to that folder and its contents. What is that user’s effective permissions to that folder when they access it through the shared folder from another computer?

Answers

Answer:

Full control

Explanation:

Full control permission enables users to access, compose, alter, and  remove documents and sub-folders.

Additionally, for all documents and  sub-directories, users can alter permissions settings.

Users are able to modify permissions and take file possession.