Which of the following best describes an intrusion prevention system?

A) Passive device that analyzes network traffic to detect unauthorized access
B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C) A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D) A device that monitors the characteristics of a single host and the events occurring on that host


B) Active device that sits inline with traffic flow and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content

Computer Science & Information Technology

You might also like to view...

Hypothesize a rationale for the following design decisions:

What will be an ideal response?

Computer Science & Information Technology

______________ are snapshots of a system at a given point of time.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What are the decimal equivalents of the following values (assume positional notation and unsigned integer formats):



What will be an ideal response?

Computer Science & Information Technology

In the figure above, the Soups document is ____ pages long.

A. six B. eight C. thirty-four D. twenty-seven

Computer Science & Information Technology