Which intrusion detection system (IDS) contains information about specific attacks and system vulnerabilities?

a. Knowledge-based IDS
b. Behavior-based IDS
c. Threat-based IDS
d. Risk-based IDS

a. Knowledge-based IDS
Knowledge-based approaches and behavior-based approaches are two fundamentally different approaches to intrusion detection. Knowledge-based intrusion detection systems contain information about specific attacks and system vulnerabilities and watch for attempts to exploit these vulnerabilities, such as repeated failed login attempts or recurring attempts to download a program to a server.When such an attempt is detected, an alarm is triggered.

Computer Science & Information Technology

You might also like to view...

You could use a(n) ________ to combine a series of commands so that they will run as a single command

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is NOT true about administrator accounts?

A) An administrator can delete other user accounts. B) You can only have one person designated as the administrator. C) An administrator can add and delete software. D) If you set up several users on a PC, you must have an administrator.

Computer Science & Information Technology