Answer the following statements true (T) or false (F)
1. The IDS component responsible for collecting data is the user interface.
2. Intrusion detection is based on the assumption that the behavior of the
intruder differs from that of a legitimate user in ways that can be quantified.
3. The primary purpose of an IDS is to detect intrusions, log suspicious
events, and send alerts.
4. Signature-based approaches attempt to define normal, or expected,
behavior, whereas anomaly approaches attempt to define proper behavior.
5. Anomaly detection is effective against misfeasors.
1. False
2. True
3. True
4. False
5. False
You might also like to view...
In the worst case, a binary search is ______.
a. O(n) b. O(1) c. O(log2 n) d. O(n2)
A variable is:
a) an instruction for the compiler b) a location in memory where a value can be stored c) a description of a value (such as a number or character) d) None of the above.