Which mode allows an intrusion detection system (IDS) to inspect a copy of every packet on a network?
A. Transparent
B. Promiscuous
C. Client
D. Server
Answer: B
Computer Science & Information Technology
You might also like to view...
Each tweet must be ________ characters or less in length
Fill in the blank(s) with correct word
Computer Science & Information Technology
Document ________ are the attributes about a presentation that describe it or identify it
Fill in the blank(s) with correct word
Computer Science & Information Technology
In a sorting algorithm ADT implementation, since we don't know the physical type, the array exchanges must treat each element as an array of characters and move them one at a time.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is not a synonym for “sentinel value.”
a) signal value b) dummy value c) counter value d) flag value
Computer Science & Information Technology