Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


 What is the difference between an HIDS and a NIDS?



 What is the difference between an HIDS and a NIDS?..

Answer / paras thakur

Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks. In HIDS, anti-threat applications such as firewalls, antivirus software and spyware-detection programs are installed on every network computer that has two-way access to the outside environment such as the Internet. In NIDS, anti-threat software is installed only at specific points such as servers that interface between the outside environment and the network segment to be protected.

Is This Answer Correct ?    2 Yes 1 No

Post New Answer

More Computer Security Interview Questions

 What’s the difference between a White Box test and a Black Box test?

2 Answers  


What is worse in Firewall Detection, a false negative or a false positive? And why?

1 Answers  


 What is your opinion on hacktivist groups such as Anonymous?

1 Answers  


What is the Three-way handshake? How can it be used to create a DOS attack?

1 Answers  


What is the difference between a virus and a trojan?

0 Answers   Tavant Technologies, Zensar,


What is the difference between closed-source and open-source? Which is better?

1 Answers  


 How would you lock down a mobile device?

1 Answers  


What is XSS?

1 Answers  


Why would you bring in an outside contractor to perform a penetration test?

1 Answers  


What is a table in computer?

0 Answers  


 Why would you want to use SSH from a Windows pc?

1 Answers  


Why are internal threats oftentimes more successful than external threats?

1 Answers  


Categories
  • Computer Security Interview Questions Computer Security (58)
  • Mobile Security Interview Questions Mobile Security (9)
  • Hacking Interview Questions Hacking (33)
  • Security AllOther Interview Questions Security AllOther (4)