Which IPS response to an attack can do the most damage?

A. None of the options
B. Dropping packets
C. limiting suspicious traffic to a certain percentage of the total bandwidth and dropping packets
D. limiting suspicious traffic to a certain percentage of the total bandwidth


B. Dropping packets

Computer Science & Information Technology

You might also like to view...

To determine whether a character entered is a letter of the alphabet, use the __________ function.

a. isdigit b. fromkeyboard c. alpaok d. isalpha e. None of these

Computer Science & Information Technology

Which of the following is the best method to move a file?

A. copy and paste the file B. dragging the file to a folder C. cut and paste the file D. open the file and save it in the desired folder

Computer Science & Information Technology

For each of the following, determine whether the practice is legal or illegal.

What will be an ideal response?

Computer Science & Information Technology

The primary circuit board of a computer system is the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology