List and describe at least four reasons to acquire and use an IDPS.
What will be an ideal response?
1. To prevent problem behaviors by increasing the perceived risk of discovery and punishment for those who would attack or otherwise abuse the system2. To detect attacks and other security violations that are not prevented by other security measures3. To detect and deal with the preambles to attacks (commonly experienced as network probes and other "doorknob rattling" activities)4. To document the existing threat to an organization5. To act as quality control for security design and administration, especially of large and complex enterprises6. To provide useful information about intrusions that do take place, allowing improved diagnosis, recovery, and correction of causative factors
You might also like to view...
Which of these is not a capability of the Advanced Filter tool?
A) Copy selected records to a new location B) Provide pop up filters C) Specify the list range D) Filter in place
Use the ______ attribute to display an image to the right of a block of text
a. align b. spacing c. alt d. height