Which of the following best defines what intrusion detection is? (Select all that apply.)

a. The monitoring of data packets passing through the network to catch potential attacks.
b. The monitoring of data packets passing through the network to catch ongoing attacks.
c. The monitoring of data packets with invalid IP addresses that pass through the network.
d. None of these answers is correct.


a. The monitoring of data packets passing through the network to catch potential attacks.
b. The monitoring of data packets passing through the network to catch ongoing attacks.

Computer Science & Information Technology

You might also like to view...

____ chips need to be recharged constantly or they lose their data.?

A. ?BIOS B. ?ROM C. ?DRAM D. ?SRAM

Computer Science & Information Technology

Moving from left to right, the first calculation in the order of operations is negation (-).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The definition for a primary key really defines a candidate key as well.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When processing a long list of values in a loop, the program knows it has reached the end of the list when the __________ value is read.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology