|
INTERVIEW QUESTIONS
MAIL MANAGEMENT SOFTWARE
MAILPROTECTOR
DETAILS
Question: What is the difference between an HIDS (Host Intrusion Detection System) and a NIDS (Network Intrusion Detection System)?
Answer: Both acronyms are Intrusion Detection Systems, however the first is a Host Intrusion Detection System whereas the second is a Network Intrusion Detection System. An HIDS runs as a background utility in the same as an anti-virus program for instance, while a Network Intrusion Detection System sniffs packets as they go across the network looking for things that aren’t quite ordinary. Both systems have two basic variants: signature based and anomaly based. Signature based is very much like an anti-virus system, looking for known values of known ‘bad things’, while anomaly looks more for network traffic that doesn’t fit the usual pattern of the network. This requires a bit more time to get a good baseline, but in the long term can be better on the uptake for custom attacks.
|
|
|
Category |
Mailprotector Interview Questions & Answers -
Exam Mode /
Learning Mode
|
Rating |
(0.3) By 6899 users |
Added on |
8/8/2016 |
Views |
71971 |
Rate it! |
|
|
Question:
What is the difference between an HIDS (Host Intrusion Detection System) and a NIDS (Network Intrusion Detection System)?
Answer:
Both acronyms are Intrusion Detection Systems, however the first is a Host Intrusion Detection System whereas the second is a Network Intrusion Detection System. An HIDS runs as a background utility in the same as an anti-virus program for instance, while a Network Intrusion Detection System sniffs packets as they go across the network looking for things that aren’t quite ordinary. Both systems have two basic variants: signature based and anomaly based. Signature based is very much like an anti-virus system, looking for known values of known ‘bad things’, while anomaly looks more for network traffic that doesn’t fit the usual pattern of the network. This requires a bit more time to get a good baseline, but in the long term can be better on the uptake for custom attacks. Source: CoolInterview.com
If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
- There should not be any Spelling Mistakes.
- There should not be any Gramatical Errors.
- Answers must not contain any bad words.
- Answers should not be the repeat of same answer, already approved.
- Answer should be complete in itself.
|
|
Related Questions |
View Answer |
|
What is the CIA triangle?
|
View Answer
|
|
why is it easier to break into a Windows local account than an AD account?
|
View Answer
|
|
What is an easy way to configure a network to allow only a single computer to login on a particular jack?
|
View Answer
|
|
How do you protect your home Wireless Access Point?
|
View Answer
|
|
What is data protection in transit vs data protection at rest?
|
View Answer
|
|
How to judge if a remote server is running IIS or Apache?
|
View Answer
|
|
What are the three ways to authenticate a person?
|
View Answer
|
|
What do you think of social networking sites such as Facebook and LinkedIn in the context of data Security?
|
View Answer
|
|
How to reset a password-protected BIOS configuration?
|
View Answer
|
|
What is the difference between a Black Hat and a White Hat?
|
View Answer
|
|
How would you find out what a POST code means?
|
View Answer
|
|
What is SSL and why is it not enough when it comes to encryption?
|
View Answer
|
|
What?s the difference between Symmetric and Asymmetric encryption?
|
View Answer
|
|
Why would you want to use SSH from a Windows pc?
|
View Answer
|
|
Why to do need to be concerned about our Mail Security?
|
View Answer
|
Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.
View All Mailprotector Interview Questions & Answers - Exam Mode /
Learning Mode
|