List of questions
Related questions
Question 137 - H12-724 discussion
In the construction of information security, the intrusion detection system plays the role of a monitor.
It monitors the flow of key nodes in the information system.
In-depth analysis to discover security incidents that are occurring. Which of the following are its characteristics?. c0O
A.
IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
B.
It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
C.
Unable to detect malicious operations or misoperations from internal killings.
D.
Cannot do in-depth inspection
Your answer:
0 comments
Sorted by
Leave a comment first