_______________ techniques can be used to monitor network traffic, looking for patterns that suggest known types of computer attacks.

A. intrusion prevention
B. intrusion detection
C. routers
D. sniffers
E. monitors


Answer: B

Computer Science & Information Technology

You might also like to view...

What step in the eight steps required to start an SQA program identifies required standards and practices?

A. Initiation B. Identification C. Writing the plan D. Establishment

Computer Science & Information Technology

What type of encryption algorithm is one-way encryption, which means that it encrypts data, but the data cannot be decrypted?

A. signing B. symmetric C. asymmetric D. hash

Computer Science & Information Technology

Convert the following 8-bit binary number to decimal: 10010011.

Computer Science & Information Technology

A service is implemented by several servers. Explain why resources might be transferred between them. Would it be satisfactory for clients to multicast all requests to the group of servers as a way of achieving mobility transparency for clients?

What will be an ideal response?

Computer Science & Information Technology