an Intrusion Detection System (IDS) that receive  input from one or more sensors or fro

Principles of Information Systems (MindTap Course List)
13th Edition
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Ralph Stair, George Reynolds
Chapter13: Cybercrime And Information System Security
Section: Chapter Questions
Problem 6RQ
icon
Related questions
Question

xi. _____are decoy systems that are designed to lure a potential attacker away from
critical systems.
• Sensors
• Honeypots
• IDS
• Encryption system 
xii. _______is a logical component of an Intrusion Detection System (IDS) that receive 
input from one or more sensors or from other analyzers.
• Sensor
• Interface
• Analyzer
• Host
xiii. In SNORT system,__________module analyzes each packet based on a set of rules
defined by the security administrator.
• Packet decoder
• Logger
• Detection engine
• Alerter
xiv. SHA-1 produces a hash value of______bits.
a. 128
b. 256
c. 160
d. 80
XV.._______virus is a form of virus explicitly designed to hide itself from detection by antivirus software
• Stealth
• Encrypted
• Polymorphic
• Metamorphic

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Risks related to security
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Systems (MindTap Course…
Principles of Information Systems (MindTap Course…
Computer Science
ISBN:
9781305971776
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning
Fundamentals of Information Systems
Fundamentals of Information Systems
Computer Science
ISBN:
9781337097536
Author:
Ralph Stair, George Reynolds
Publisher:
Cengage Learning