This topic contains a solution. Click here to go to the answer

Author Question: Network and host __________ monitor and analyze network and host activity and usually compare this ... (Read 27 times)

mcmcdaniel

  • Hero Member
  • *****
  • Posts: 550
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
 
  What will be an ideal response?

Question 2

A(n) _______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

alexisweber49

  • Sr. Member
  • ****
  • Posts: 311
Answer to Question 1

intrusion detection systems (IDS)

Answer to Question 2

vulnerability




mcmcdaniel

  • Member
  • Posts: 550
Reply 2 on: Jul 7, 2018
Excellent


apple

  • Member
  • Posts: 352
Reply 3 on: Yesterday
Great answer, keep it coming :)

 

Did you know?

Asthma occurs in one in 11 children and in one in 12 adults. African Americans and Latinos have a higher risk for developing asthma than other groups.

Did you know?

Alcohol acts as a diuretic. Eight ounces of water is needed to metabolize just 1 ounce of alcohol.

Did you know?

Eat fiber! A diet high in fiber can help lower cholesterol levels by as much as 10%.

Did you know?

Not getting enough sleep can greatly weaken the immune system. Lack of sleep makes you more likely to catch a cold, or more difficult to fight off an infection.

Did you know?

In 2010, opiate painkllers, such as morphine, OxyContin®, and Vicodin®, were tied to almost 60% of drug overdose deaths.

For a complete list of videos, visit our video library