Which of the following are functions that are compatible in a properly segregated environment? Show A. B. C. D.
What is the most common way to classify IDSS?The most common way to classify intrusion-detection systems is to group them according to the location of the information source. Basic information sources are network packets captured from a network backbone or local network segments, operating systems, and critical files.
What tool is being used to determine whether attackers have altered system files of executables?File integrity monitoring (FIM) refers to an IT security process and technology that tests and checks operating system (OS), database, and application software files to determine whether or not they have been tampered with or corrupted.
What is the primary reason for designing the security kernel to be as small as possible?System performance and execution are enhanced. Due to its compactness, the kernel is easier to formally verify.
|