This system adds the capability to react to an attack detected by another component.
A. intrusion detection system (IDS)
B. host-based IDS (HIDS)
C. intrusion prevention system (IPS)
D. network-based IDS (NIDS)
Answer: C
Computer Science & Information Technology
You might also like to view...
Which of the following statements about a JLabel is false?
a. Applications rarely change a label’s contents after creating it. b. A JLabel can display text and an image. c. A JLabel can display text and a button. d. A JLabel is a subclass of JComponent.
Computer Science & Information Technology
The first word in a method name should be a(n) ____.
A. noun B. verb C. adjective D. adverb
Computer Science & Information Technology
Outlook allows you to store a lifetime list of contacts.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The _______ statement finds the minimum value in row 8 for columns A-E
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology