Discuss About Network IDS Scanning Traffic To Match Attack Patterns



1. A network-based IDS that scans packet traffic to try to match known attack patterns is called a signature-based NIDS.  


2. Which of the following is a limitation of Snort?

a. Cannot be centrally monitored with sensors running on different OSes

b. Cannot protect against insider threats

c. Cannot inspect encrypted traffic for attack signatures

d. Cannot scale effectively to protect a large network

e. Cannot detect application-layer attacks




This true or false and multiple choice questions belong to Computer Science and they discuss about network based IDS scanning packet traffic to try to match known attack patterns.

Total Word Count NA

Download Full Solution


  • HWA

    this is a very good website

  • HWA

    I have 50 questions for the same test your page is showing only 28

  • HWA

    hi can you please help or guide me to answer my assignments. thanks

  • HWA

    hi can anyone help or guide me to my assignments. thanks

  • HWA

  • HWA

    This solution is perfect ...thanks

  • HWA

    Hello Allison,I love the 2nd image that you did! I also, had never heard of SumoPaint, is something that I will have to exolpre a bit! I understand completely the 52 (or so) youtube videos that you probably watched. Sometimes they have what you want, sometimes they don't! However, it is always satisfying when you are able to produce something that you have taught yourself. Great job!Debra 0 likes

  • HWA

    Perfect bank of solution. 

  • HWA

    great !

  • HWA
    Paul Brandon-Fritzius

    thanks for the quick response. the solution looks good. :)

  • HWA
    tina Johnson

    thnx for the answer. it was perfect. just the way i wanted it. 

  • HWA

    works fine.