Need the key terms quiz answered with the key terms unsolici
Need the key terms quiz answered with the key terms
unsolicited comieildl Apply host-based security applications -IDSs can be host-based, examining only the activity applicable to a specific system, or network-based, 11 Key Terms access control lists (ACLs) (335) analysis engine (325) anomaly detection model (333) antispam (357) antivirus (351) content-based signature (33 I) context-based signature (331) digital sandbox (343) false negative (332) false positive (332) firewall (334) heuristic scanning (352) honeynet (345) honeypot (343) host-based IDS (HIDS) (324) Internet content filter (341) intrusion detection system (IDS) (322) intrusion prevention system (IPS) (331) misuse detection model (333) Network Address Translation (NAT) (335) network tap (342) network-based IDS (NIDS) (324) perimeter security (326) pop-up blocker (355) port mirroring (342) protocol analyzer (341) proxy server (339) signature database (325) Switched Port Analyzer (SPAN) (342) traffic collector (325) user interface (325) Key Terms Quiz Use terms from the Key Terms list to complete the sentences that follow. Don\'t use the same term more An attacker scanning a network seemingly vulnerable targets might actual 3. r scanning a network full of ins Solution
1)Network analyzer or network sniffer
2)False positive
3)Honey pot
4)Context-based signatures
5)False Negative
6)Access Control Lists(ACLs)
7)Analysis engine
9)Context-based signatures
10)Proxy server
