InterviewSolution
| 1. |
What Are Intrusion Detection Systems(ids)? |
|
Answer»
IDSs require complex configurations to provide the level of detection and response desired An IDS operates as either network-based, when the technology is focused on protecting network information assets, or host-based, when the technology is focused on protecting server or host information assets IDSs use one of TWO detection methods, signature-based or STATISTICAL anomaly-based. IDSs work like burglar alarms IDSs require complex configurations to provide the level of detection and response desired An IDS operates as either network-based, when the technology is focused on protecting network information assets, or host-based, when the technology is focused on protecting server or host information assets IDSs use one of two detection methods, signature-based or statistical anomaly-based. |
|