menu
Qamnty
Login
Register
My account
Edit my Profile
Private messages
My favorites
The symantec endpoint protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detec…
Ask a Question
Questions
Unanswered
Tags
Ask a Question
The symantec endpoint protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detec…
asked
Feb 10, 2018
88.3k
views
1
vote
The symantec endpoint protection engine, used to scan files, folders, and memory locations for different types of malware, is a good example of a _________-based intrusion detection/prevention software
Computers & Tech
high-school
Grungetta
asked
by
Grungetta
8.0k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
3
votes
The answer to this question is
host
.
A host-based intrusion prevention software helps in protecting each computer individually and keeps them free of threats like different types of Internet malware and viruses. Here, the computers are considered to be hosts.
On the other hand, a host intrusion detection system alerts the users of the presence of the above-mentioned threats. However, it does not prevent them from attacking the hosts.
Hossein Ganjyar
answered
Feb 15, 2018
by
Hossein Ganjyar
8.1k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Mar 20, 2019
117k
views
Developed by ibm and refined by symantec, the __________ provides a malware detection system that will automatically capture, analyze, add detection and shielding, or remove new malware and pass information
LeonidasFett
asked
Mar 20, 2019
by
LeonidasFett
8.7k
points
Computers & Tech
high-school
1
answer
4
votes
117k
views
asked
Mar 10, 2024
144k
views
1. (04.01 MC) The main purpose of an intrusion detection system is to (5 points) analyze network traffic block malicious malware prevent adware filter and block web browsing activity 2. (04.01 LC) Intrusion
Martin Foot
asked
Mar 10, 2024
by
Martin Foot
8.4k
points
Computers & Tech
college
1
answer
0
votes
144k
views
asked
Feb 1, 2024
53.6k
views
Log filtering (3 methods) Options: A. Whitelisting, blacklisting, and graylisting B. Social engineering, phishing, and vishing C. Malware, adware, and spyware D. Honeypots, firewalls, and intrusion detection
ProbablePattern
asked
Feb 1, 2024
by
ProbablePattern
8.2k
points
Computers & Tech
high-school
1
answer
3
votes
53.6k
views
Ask a Question
Welcome to Qamnty — a place to ask, share, and grow together. Join our community and get real answers from real people.
Categories
All categories
Mathematics
(3.7m)
History
(955k)
English
(903k)
Biology
(716k)
Chemistry
(440k)
Physics
(405k)
Social Studies
(564k)
Advanced Placement
(27.5k)
SAT
(19.1k)
Geography
(146k)
Health
(283k)
Arts
(107k)
Business
(468k)
Computers & Tech
(195k)
French
(33.9k)
German
(4.9k)
Spanish
(174k)
Medicine
(125k)
Law
(53.4k)
Engineering
(74.2k)
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search Qamnty