Which of the following are its characteristics?
In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring .
Which of the following are its characteristics?
A . IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
B. It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
C. Unable to detect malicious operations or misoperations from internal killings.
D. Cannot do in-depth inspection
Answer: A
Latest H12-724-ENU Dumps Valid Version with 367 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments