Why does a stealth mode IDS need a separate network to communicate alarms and to accept management commands?

What will be an ideal response?

The stealth mode IDS does not want to appear on its monitored network. To send an alarm, the IDS would need to initiate a communication with itself as the sender.

Computer Science & Information Technology

You might also like to view...

Theatrical release and digital movies play at ____ frames per second.

A. 12 B. 16 C. 24 D. 240

Computer Science & Information Technology

Large companies, such as Panasonic and LG Electronics, use expensive database software like ____ to serve out massive amounts of data to multiple users.

A. MySQL B. Access C. DB2 D. ODBC

Computer Science & Information Technology