Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
               
      
1
 
    
2
 
        
    
 
 
3
      
    
 
 
      
    
 
 
 
4
    
   
5
   
    
   
 
    
      
6
   
          
    
  
7
  
               
               
 
Answer:

Across
1- resides on a particular computer or server, known as the host, and monitors _____ only on that system
5as detected by an intrusion _____ prevention system, the level of network activity that is established as a baseline and therefore activity volumes above that level are considered suspect
6)- the level at which the _____ of false rejections equals the false acceptances, and is also known as the equal error rate
7- honey pot that has been protected so that it cannot be easily _____
Down
1tools used by both attackers and defenders to identify or fingerprint the computers that are _____ on a network, as well as the ports and services active on those computers, the functions and roles the machines are fulfilling, and other useful informati
2hack into a hacker’s system to find out as much as possible about the _____
3Intrusion prevention _____ (IPS)
4Synchronous _____

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: chels2407
Popular Computers sets