This topic contains a solution. Click here to go to the answer

Author Question: __________ involves an attempt to define a set of rules or attack patterns that can be used to ... (Read 22 times)

ETearle

  • Hero Member
  • *****
  • Posts: 580
__________ involves an attempt to define a set of rules or attack patterns that can be used to decide if a given behavior is that of an intruder.
 
  A. Profile based detection B. Signature detection
   C. Threshold detection D. Anomaly detection

Question 2

The purpose of the ________ module is to collect data on security related events on the host and transmit these to the central manager.
 
  A. central manager agent B. LAN monitor agent
   C. host agent D. architecture agent



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

kaylee05

  • Sr. Member
  • ****
  • Posts: 318
Answer to Question 1

B

Answer to Question 2

C





 

Did you know?

You should not take more than 1,000 mg of vitamin E per day. Doses above this amount increase the risk of bleeding problems that can lead to a stroke.

Did you know?

Approximately 15–25% of recognized pregnancies end in miscarriage. However, many miscarriages often occur before a woman even knows she is pregnant.

Did you know?

Though the United States has largely rejected the metric system, it is used for currency, as in 100 pennies = 1 dollar. Previously, the British currency system was used, with measurements such as 12 pence to the shilling, and 20 shillings to the pound.

Did you know?

The most common childhood diseases include croup, chickenpox, ear infections, flu, pneumonia, ringworm, respiratory syncytial virus, scabies, head lice, and asthma.

Did you know?

HIV testing reach is still limited. An estimated 40% of people with HIV (more than 14 million) remain undiagnosed and do not know their infection status.

For a complete list of videos, visit our video library