This topic contains a solution. Click here to go to the answer

Author Question: Network and host __________ monitor and analyze network and host activity and usually compare this ... (Read 89 times)

mcmcdaniel

  • Hero Member
  • *****
  • Posts: 550
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
 
  What will be an ideal response?

Question 2

A(n) _______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

alexisweber49

  • Sr. Member
  • ****
  • Posts: 311
Answer to Question 1

intrusion detection systems (IDS)

Answer to Question 2

vulnerability




mcmcdaniel

  • Member
  • Posts: 550
Reply 2 on: Jul 7, 2018
:D TYSM


frankwu0507

  • Member
  • Posts: 322
Reply 3 on: Yesterday
Wow, this really help

 

Did you know?

By definition, when a medication is administered intravenously, its bioavailability is 100%.

Did you know?

According to the FDA, adverse drug events harmed or killed approximately 1,200,000 people in the United States in the year 2015.

Did you know?

The top 10 most important tips that will help you grow old gracefully include (1) quit smoking, (2) keep your weight down, (3) take supplements, (4) skip a meal each day or fast 1 day per week, (5) get a pet, (6) get medical help for chronic pain, (7) walk regularly, (8) reduce arguments, (9) put live plants in your living space, and (10) do some weight training.

Did you know?

Women are 50% to 75% more likely than men to experience an adverse drug reaction.

Did you know?

It is believed that humans initially contracted crabs from gorillas about 3 million years ago from either sleeping in gorilla nests or eating the apes.

For a complete list of videos, visit our video library