This system adds the capability to react to an attack detected by another component.

A. intrusion detection system (IDS)
B. host-based IDS (HIDS)
C. intrusion prevention system (IPS)
D. network-based IDS (NIDS)


Answer: C

Computer Science & Information Technology

You might also like to view...

Which of the following statements about a JLabel is false?

a. Applications rarely change a label’s contents after creating it. b. A JLabel can display text and an image. c. A JLabel can display text and a button. d. A JLabel is a subclass of JComponent.

Computer Science & Information Technology

The first word in a method name should be a(n) ____.

A. noun B. verb C. adjective D. adverb

Computer Science & Information Technology

Outlook allows you to store a lifetime list of contacts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The _______ statement finds the minimum value in row 8 for columns A-E

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology