Which of the following software types would BEST be used for identifying an attack?
A. IDS
B. IPS
C. Packet sniffer
D. Port scanner
Answer: A. IDS
You might also like to view...
Case-Based Critical Thinking QuestionsCase 2Bernard knows that Access has a series of special types of queries that can help him evaluate and verify the data stored in a database. He uses the Help resources available with Access to learn more about these queries. Bernard finds himself running some queries multiple times with changes to the criteria. He wants to look up in Access Help how to do this more efficiently. What term should he research in the Help system?
A. differential query B. comparative query C. baseline query D. parameter query
the command chmod 777 myfile
a: grants rwx access to user ID number 777 to use myfile b: grants rwx access to all users of myfile c: denies rwx access to all users of myfile d: grants rwx access only to the owner of myfile e: makes myfile a hidden file
When you export an object from Access to Word, Access creates a file in the PDF format
Indicate whether the statement is true or false
Which HDLC field is equivalent to the preamble in Ethernet?
A) Flag B) Address C) Control D) FCS