Which of the following occurs when an IDS identifies legitimate activity as something malicious?
A. False-negative
B. False-positive
C. Monitoring positive
D. Misidentification
B. A false positive is when an IDS identifies legitimate activity as something malicious. It is a type of misidentification. False negatives are when the IDS lets an attack intruder on the network thinking it is legitimate. Monitoring positive is another name for an event that was monitored that is known to be true, but this terminology is not often used when referring to an IDS.
You might also like to view...
A single precision floating point number stored in a computer has three parts. They are:
a. sign, binary point, mantissa b. sign, exponent, mantissa c. integer, binary point, fraction d. sign, integer, fraction
The simplest mode of operation is the ___________ mode, in which plaintext is handled one block at a time and each block of plaintext is encrypted using the same key.
Fill in the blank(s) with the appropriate word(s).