This topic contains a solution. Click here to go to the answer

Author Question: Network and host __________ monitor and analyze network and host activity and usually compare this ... (Read 86 times)

mcmcdaniel

  • Hero Member
  • *****
  • Posts: 550
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
 
  What will be an ideal response?

Question 2

A(n) _______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

alexisweber49

  • Sr. Member
  • ****
  • Posts: 311
Answer to Question 1

intrusion detection systems (IDS)

Answer to Question 2

vulnerability




mcmcdaniel

  • Member
  • Posts: 550
Reply 2 on: Jul 7, 2018
Excellent


FergA

  • Member
  • Posts: 352
Reply 3 on: Yesterday
Thanks for the timely response, appreciate it

 

Did you know?

Blood in the urine can be a sign of a kidney stone, glomerulonephritis, or other kidney problems.

Did you know?

The Romans did not use numerals to indicate fractions but instead used words to indicate parts of a whole.

Did you know?

Oxytocin is recommended only for pregnancies that have a medical reason for inducing labor (such as eclampsia) and is not recommended for elective procedures or for making the birthing process more convenient.

Did you know?

Historic treatments for rheumatoid arthritis have included gold salts, acupuncture, a diet consisting of apples or rhubarb, nutmeg, nettles, bee venom, bracelets made of copper, prayer, rest, tooth extractions, fasting, honey, vitamins, insulin, snow collected on Christmas, magnets, and electric convulsion therapy.

Did you know?

There are 20 feet of blood vessels in each square inch of human skin.

For a complete list of videos, visit our video library