Which of the following are its characteristics?

In the construction of information security, the intrusion detection system plays the role of a monitor. It monitors the flow of key nodes in the information system.

In-depth analysis to discover security incidents that are occurring .

Which of the following are its characteristics?
A . IDS can be linked with firewalls and switches to become a powerful "assistant" of firewalls, which can better and more accurately control access between domains.
B. It is impossible to correctly analyze the malicious code doped in the allowed application data stream.
C. Unable to detect malicious operations or misoperations from internal killings.
D. Cannot do in-depth inspection

Answer: A

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments