What is the difference between an HIDS and a NIDS?
Answer / paras thakur
Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. In HIDS, anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet. In NIDS, anti-threat software is installed only at specific points such as servers that interface between the outside environment and the network segment to be protected.
| Is This Answer Correct ? | 2 Yes | 1 No |
What is the Chain of Custody?
What is the difference between a Black Hat and a White Hat?
Why would you bring in an outside contractor to perform a penetration test?
What’s better, a red team or a blue team?
I run an SMB. I have 4 people in my entire company and a web-based store. I don’t have the time, patience or manpower to have a computer guy. Why should I care about exploits and computer jibberish?
What is the difference between a vulnerability and an exploit?
What are the most common computer applications?
1. Assume that passwords are selected from four-character combination of 26 alphabetic characters. Assume that an adversary is able to attempt passwords at a rate of one per second. a. Assuming no feedback to the adversary until each attempt has been completed, what is the expected time to recover the correct password? b. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password?
What is the Three-way handshake? How can it be used to create a DOS attack?
What is worse in Firewall Detection, a false negative or a false positive? And why?
You are remoted in to a headless system in a remote area. You have no physical access to the hardware and you need to perform an OS installation. What do you do?
You are an employee for a tech department in a non-management position. A high-level executive demands that you break protocol and allow him to use his home laptop at work. What do you do?