This topic contains a solution. Click here to go to the answer

Author Question: Network and host __________ monitor and analyze network and host activity and usually compare this ... (Read 57 times)

mcmcdaniel

  • Hero Member
  • *****
  • Posts: 550
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
 
  What will be an ideal response?

Question 2

A(n) _______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

alexisweber49

  • Sr. Member
  • ****
  • Posts: 311
Answer to Question 1

intrusion detection systems (IDS)

Answer to Question 2

vulnerability




mcmcdaniel

  • Member
  • Posts: 550
Reply 2 on: Jul 7, 2018
YES! Correct, THANKS for helping me on my review


sailorcrescent

  • Member
  • Posts: 334
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

Most childhood vaccines are 90–99% effective in preventing disease. Side effects are rarely serious.

Did you know?

The calories found in one piece of cherry cheesecake could light a 60-watt light bulb for 1.5 hours.

Did you know?

When blood is exposed to air, it clots. Heparin allows the blood to come in direct contact with air without clotting.

Did you know?

Autoimmune diseases occur when the immune system destroys its own healthy tissues. When this occurs, white blood cells cannot distinguish between pathogens and normal cells.

Did you know?

Aspirin is the most widely used drug in the world. It has even been recognized as such by the Guinness Book of World Records.

For a complete list of videos, visit our video library