Question
a.
Most are based on simple pattern matching algorithms
b.
It is programmed to interpret a certain series of packets
c.
It models the normal usage of network as a noise characterization
d.
Anything distinct from the noise is assumed to be intrusion activity
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What are characteristics of signature based IDS ?
Similar Questions
Discover Related MCQs
Q. What are drawbacks of signature based IDS ?
View solution
Q. What are characteristics of Host based IDS ?
View solution
Q. What are drawbacks of the host based IDS ?
View solution
Q. What are strengths of the host based IDS ?
View solution
Q. What are characteristics of stack based IDS ?
View solution
Q. What are characteristics of Network based IDS ?
View solution
Q. What are strengths of Network based IDS ?
View solution
Q. What is preferred way of encryption ?
View solution
Q. What is not a role of encryption ?
View solution
Q. What is cipher-block chaining ?
View solution
Q. What is not an encryption standard ?
View solution
Q. Which of following is not a stream cipher?
View solution
Q. What is a Hash Function ?
View solution
Q. MD5 produces __ bits hash data.
View solution
Q. SHA-1 produces __ bit of hash.
View solution
Q. Which two of the following are authentication algorithms ?
View solution
Q. What is role of Key Distribution Center ?
View solution
Q. In domain structure what is Access-right equal to ?
View solution
Q. What is meaning of right-set ?
View solution
Q. What is Domain ?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!