Problem
a) How does a network-based IDPS differ from a host-based IDPS? Which has the ability to analyze encrypted packets?
b) Explain the difference between network footprinting and network fingerprinting.
c) What is a vulnerability scanner? What is the difference between active and passive vulnerability scanners?