________ monitor networks and application log files—files containing information on files, including who accessed them and when—so if an intruder makes it into the network or an unauthorized application, the system detects the intrusion, halts the session and sets off an alarm to notify the system administrator.

a) Intrusion-detection systems.
b) Digital-signature systems.
c) Air-gap systems.
d) None of the above


a) Intrusion-detection systems.

Computer Science & Information Technology

You might also like to view...

A ________ box alerts you to a potential problem and gives you the options of continuing or stopping the process

A) message B) dialog C) warning D) window

Computer Science & Information Technology

________ is the standard internal drive interface used to connect drives to the motherboard

Fill in the blank(s) with correct word

Computer Science & Information Technology

A dat macro is created while you are viewing a ________ in Datasheet view

A) table B) macro C) report D) query

Computer Science & Information Technology

The default corners where borders join are ________

A) angled B) mitered C) dashed D) rounded

Computer Science & Information Technology