The ________ module examines violation events and, depending on event type, either automatically invokes the policy enforcer or sends an action request to the network manager.

A) Traffic monitor
B) Policy checker
C) Event handler
D) Topology manager


C) Event handler

Computer Science & Information Technology

You might also like to view...

When an application is configured for ____, it periodically checks the software publisher's Web site for updates, downloads updates automatically, and installs them without user intervention.

A. automatic downloads B. version updates C. automatic updates D. software upgrades

Computer Science & Information Technology

If you want to create thumbnails with properties that differ from the default, you should change the Auto Thumbnail settings in the ____________________ options before you create the thumbnail.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Suppose a telephone company maintained records on every telephone call it handled, showing the calling phone number; the called phone number; and the time, date, and duration of the call. What uses might the telephone company make of those records? What uses might commercial marketers make? What uses might a rival telephone company make? What uses might a government make? Which of those uses

violate individuals' privacy rights? What will be an ideal response?

Computer Science & Information Technology

The row and column arguments in the INDEX function can be numeric values, Boolean values, or text.

a. true b. false

Computer Science & Information Technology