Which of the following software types would BEST be used for identifying an attack?

A. IDS
B. IPS
C. Packet sniffer
D. Port scanner


Answer: A. IDS

Computer Science & Information Technology

You might also like to view...

Case-Based Critical Thinking QuestionsCase 2Bernard knows that Access has a series of special types of queries that can help him evaluate and verify the data stored in a database. He uses the Help resources available with Access to learn more about these queries. Bernard finds himself running some queries multiple times with changes to the criteria. He wants to look up in Access Help how to do this more efficiently. What term should he research in the Help system?

A. differential query B. comparative query C. baseline query D. parameter query

Computer Science & Information Technology

the command chmod 777 myfile

a: grants rwx access to user ID number 777 to use myfile b: grants rwx access to all users of myfile c: denies rwx access to all users of myfile d: grants rwx access only to the owner of myfile e: makes myfile a hidden file

Computer Science & Information Technology

When you export an object from Access to Word, Access creates a file in the PDF format

Indicate whether the statement is true or false

Computer Science & Information Technology

Which HDLC field is equivalent to the preamble in Ethernet?

A) Flag B) Address C) Control D) FCS

Computer Science & Information Technology