List and describe the four advantages of HIDPSs.

What will be an ideal response?

1. An HIDPS can detect local events on host systems and detect attacks that may elude a network-based IDS.2. An HIDPS functions on the host system, where encrypted traffic will have been decrypted and is available for processing.3. The use of switched network protocols does not affect an HIDPS.4. An HIDPS can detect inconsistencies in how applications and systems programs were used by examining the records stored in audit logs. This can enable it to detect some types of attacks, including Trojan horse programs.

Computer Science & Information Technology

You might also like to view...

Which of the following are benefits of using VPNs? (Choose all that apply)

a. Eliminates the need for expensive dedicated WAN links b. Uses advanced encryption and authentication protocols c. Supports DSL and cable d. Cost savings using ISDN and PSTN connections e. Easy to add new users f. Cost savings using PVCs

Computer Science & Information Technology

A(n) ____________ is a class property that is defined by only a single line of code.

a. auto-implemented property b. inline property c. base property d. derived property

Computer Science & Information Technology