General Culture
Wednesday, 28 August 2019
Tuesday, 23 July 2019
host intrusion detection system (HIDS) used for?
An HIDS is used to monitor potential or suspected intrusions on a system or host
unlike an NIDS it cannot be used to monitor traffic or activity on a network.
it looks for changes to files,
misuse,
privilege abuse,
alterations to log files,
and other activities depending on the vendor.
unlike an NIDS it cannot be used to monitor traffic or activity on a network.
it looks for changes to files,
misuse,
privilege abuse,
alterations to log files,
and other activities depending on the vendor.
LOIC is used for?
The Low Orbit Ion Cannon(LOIC)
is used to perform DoS or DDoS attacks against a victim system.
is used to perform DoS or DDoS attacks against a victim system.
what is the problem with SMTP about security?
the protocol is unencrypted
provides no protection against sniffing or hijacking
the protocol can be protected
if used with a VPN or similar technology.
provides no protection against sniffing or hijacking
the protocol can be protected
if used with a VPN or similar technology.
802.11 standards covers security relating to WPA2?
802.11i is the standard concerned
with the design and implementation of WPA2.
with the design and implementation of WPA2.
Subscribe to:
Comments (Atom)