Why does a stealth mode IDS need a separate network to communicate alarms and to accept management commands?
What will be an ideal response?
The
stealth
mode
IDS
does
not
want
to
appear
on
its
monitored
network.
To
send
an
alarm,
the
IDS
would
need
to
initiate
a
communication
with
itself
as
the
sender.
Computer Science & Information Technology
You might also like to view...
Details around how a retinal scanner is used would be found in the acceptable use section of a security policy
Indicate whether the statement is true or false
Computer Science & Information Technology
?Which of the following examples tests whetherxis equal to 5 oryis equal to 8?
A. ?(x === 5) && (y === 8) B. ?(x === 5) : (y === 8) C. ?(x === 5) || (y === 8) D. ?(x === 5) / (y === 8)
Computer Science & Information Technology