a. What do firewalls do that IDSs do not?
20a.) ______ stop definite attack packets.
a. Firewalls
b. IDSs
c. Both A and B
d. Neither A nor B
b. What do IDSs do that firewalls do not?
20b.) ______ focus on suspicious packets.
a. Firewalls
b. IDSs
c. Both A and B
d. Neither A nor B
c .Compare what is logged by IDSs and firewalls.
20c.) ______ log provable attack packets.
a. Firewalls
b. IDSs
c. Both A and B
d. Neither A nor B
d. Why are IDS false alarms a problem?
20d.) The rate of alarms in IDSs is usually ______ .
a. About right
b. Somewhat more than desirable
c. Much more than desirable
d. Optimized for rapidly finding real incidents
e. What standard do device IDSs normally use to send their log data to the central IDS?
20e.) Device IDSs typically send log files to the central IDS log file using the ______ protocol.
a. FTP
b. HTTP
c. TFTP
d. SysLog