answersLogoWhite

0


Best Answer

The IDS method that is operating system dependent is Network Based

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Which IDS method is operating system dependent?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Performing Arts
Related questions

What is the purpose of a Cisco IDS?

A Cisco IDS is an effective security system to prevent your computer system from being attacked by malicious Internet worms, unauthorised intrusions etc.


Which type of IDS compares your system to a baseline?

anomaly based


How does a behavior-based IDS work?

B: It monitors your system for signs of a compromised system


Which type of IDS monitors your system for activities that would occur on a compromised system?

Behavior-based


Which type of IDS monitors you system for activities that would occur on a compromised system?

Behavior based


How would the anomoly-based IDS be described?

I compares your system to a baseline.


How does an IPS differ from and IDS?

Intrusion Prevention System (IPS) - Software which monitors network traffic or system activities for malicious activity and attempts to block said activity from accessing your network/machine. Intrusion Detection System (IDS) - Software which monitors network traffic or system activities for malicious activity and alerts users on possible threats.


Which system is an automated family of system used for wing level deployments and contingency operations?

Integrated Deployment System (IDS)


How does a signature-based IDS function?

It monitors the system based upon signatures


Susan will be configuring a snort network IDS sensor to monitor her subnetwork She will be using a web-based console interface to manage the IDS system and will need to configure an?

Alert Monitor


Susan will be configuring a snort network IDS sensor to monitor her subnetwork. She will be using a web-based console interface to manage the IDS system and will need to configure an?

Alert Monitor


How would the anomaly-based IDS be described?

Type your answer here... It compares your system to a baseline