One form of IDS starts operation by generating an alert for every action. Over time, the administrator adjusts the setting of the IDS so that common, benign activities do not generate alarms. What are the advantages and disadvantages of this design for an IDS?

What will be an ideal response?

Pro:
Adjusts
to
characteristics
of
monitored
network.
Con:
The
tuning
process
can
be
painful
and
time
consuming.

Computer Science & Information Technology

You might also like to view...

If you want more than one animation effect assigned to one object, you need to choose ________ Animation in the Advanced Animation group

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the HTML code: This is a paragraph. is the ____, and is the _____. The text "This is a paragraph." is the _____

a. element content; start tag; end tag b. element content; end tag; start tag c. start tag; end tag; element content d. start tag; element content; end tag e. end tag; start tag; element content f. end tag; element content; start tag

Computer Science & Information Technology