A more proactive approach than intrusion detection is a(n) ____.

A. RF fingerprinting
B. trilateration system
C. RSSI system
D. intrusion prevention system (IPS)


Answer: D

Computer Science & Information Technology

You might also like to view...

Can password cracking be prevented? How?

What will be an ideal response?

Computer Science & Information Technology

A cell address (as it applies to Excel 2010)

A) searches for and displays similar labels as you type. B) identifies a cell by a column letter and a row number. C) is a number that represents a quantity and can be the basis of calculations. D) identifies the electronic "neighborhood" of a spreadsheet.

Computer Science & Information Technology

A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In a client/server network, each network node communicates directly with every other node on the network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology