Question 1 It is impossible to configure Snort to selectively display alerts for rules in a ruleset. True False Question 2 Network monitoring professionals often ________ their intrusion detection rulesets based on their understanding of a network's security posture, organizational security policies, or legal/regulatory compliance requirements. A. summarize B. obfuscate C. randomize D. tailor Question 3 PfSense is a well-known open source application that can perform which of the following networking functions? A. Routing B. Switching C. Firewalling D. All of these Question 4 Snort's intrusion detection capabilities are based on which of the following? A. Machine learning algorithms B. Specially crafted rules that tell the system to alert on anomalous network communications C. Compiled binary definition files D. Visual diagrams of network traffic flows Question 5 Splunk stores data in specialized databases called forwarders. True False.