Case-Based Critical Thinking QuestionsCase 9-1Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network.
Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.
A. IPS
B. firewall
C. antivirus software
D. RAM
Answer: A
Computer Science & Information Technology
You might also like to view...
Give a brief account of the History Manager.
What will be an ideal response?
Computer Science & Information Technology
A(n) ________ is a private network that uses a public network (usually the _____) to connect securely to remote sites. The blanks should be filled with:
a. NIC, WAN b. WAN, pipeline c. protocol, LAN d. VPN, Internet
Computer Science & Information Technology
The primary goal of the __________ monitoring domain is an informed awareness of the state of all the organization's networks, information systems, and information security defenses.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
What socket do Coffee Lake processors use?
A. LGA2011 B. LGA1151 version 2 C. LGA1150 D. LGA1151 version 1
Computer Science & Information Technology