This topic contains a solution. Click here to go to the answer

Author Question: Network and host __________ monitor and analyze network and host activity and usually compare this ... (Read 77 times)

mcmcdaniel

  • Hero Member
  • *****
  • Posts: 550
Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
 
  What will be an ideal response?

Question 2

A(n) _______ is a characteristic of a piece of technology that can be exploited to perpetrate a security incident.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

alexisweber49

  • Sr. Member
  • ****
  • Posts: 311
Answer to Question 1

intrusion detection systems (IDS)

Answer to Question 2

vulnerability




mcmcdaniel

  • Member
  • Posts: 550
Reply 2 on: Jul 7, 2018
Excellent


zacnyjessica

  • Member
  • Posts: 345
Reply 3 on: Yesterday
YES! Correct, THANKS for helping me on my review

 

Did you know?

In most climates, 8 to 10 glasses of water per day is recommended for adults. The best indicator for adequate fluid intake is frequent, clear urination.

Did you know?

Many medications that are used to treat infertility are injected subcutaneously. This is easy to do using the anterior abdomen as the site of injection but avoiding the area directly around the belly button.

Did you know?

In 2012, nearly 24 milliion Americans, aged 12 and older, had abused an illicit drug, according to the National Institute on Drug Abuse (NIDA).

Did you know?

Approximately 25% of all reported medication errors result from some kind of name confusion.

Did you know?

If you could remove all of your skin, it would weigh up to 5 pounds.

For a complete list of videos, visit our video library