T F To have a Snort rule match on both
inbound and outbound traffic, the rule should use the
flow:to_server,from_client,established;
option.
Answer: _____
T F Host-based IDS can be used to
monitor compliance with corporate policies such as acceptable use
of computer resources.
Answer: _____
T F An on-demand operational IDS model
is not suitable if legally admissible data collection is
required. Answer:
_____
T F Current criminal and civil
procedure laws and rules of evidence do not apply to...