answersLogoWhite

0

Deploy an intrusion detection system (NIDS).

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

What is meant by the term securing your perimeter network security?

your perimeter network is the network you operate such as you have the internet and your network your network is your perimeter


What is unidentified network?

an unidentified network is one where the SSID cannot be detected


What is unidentifiable?

an unidentified network is one where the SSID cannot be detected


What type of network device can be configured as a perimeter firewall?

Router


When would you use a port scanner to test your perimeter network?

To identify potential holes in network firewalls


What is SSL protocol?

The Secure Socket Layer (SSL) is a security protocol deployed on networks. The network can be an internal network or the internet over which two computers are communicating.


Which type of server is usually within an organization's perimeter network?

Web server Most organizations place their web servers in a perimeter network. A perimeter network is a special area located between the internal network's line of defense and the internet. This area allows you to place devices that are to be accessible to the public, while at the same time, protecting the private network from the public. Devices that are normally located in such networks include public web servers, e-mail servers, and FTP servers


What happens when you plugin the Ethernet cable to your PC?

when ethernet cable is plugged in it is detected by ethernet card. if the cable is connected to network it detects that network and dispalys " you are connected to network"


Which practice is a minimum requirement for securing a network?

Log all activity on the network.


What is perimeter network?

yes if you +|-b squared b 2exponent -4ac over 2a


Which solution when deployed on a network looks for policy matches via the use of IP addresses and port numbers?

proxy firewall


Which type of network scanner can allow you to detect and stop malicious activity on a network?

IPS