________ intrusion-detection software monitors traffic on a network for any unusual patterns that might indicate DoS attacks or attempted entry into a network by an unauthorized user.
a) Host-based.
b) Firewall-based.
c) Network-based.
d) None of the above
c) Network-based.
Computer Science & Information Technology
You might also like to view...
________ programming is a technique for writing apps containing tasks that can execute asynchronously, which can improve app performance and GUI responsiveness in apps with long-running or compute-intensive tasks.
a) synchronous b) object-oriented c) task-oriented d) Asynchronous
Computer Science & Information Technology
What are the three commonly selected components installed in a SQL Server 2012 instance?
What will be an ideal response?
Computer Science & Information Technology
The logical operator ____ has the highest priority and is evaluated first.
A. Or B. Xor C. Not D. And
Computer Science & Information Technology
Which of the following is an open electronic publishing format?
a. PDF b. azw c. ePub d. SMS
Computer Science & Information Technology