________ monitor networks and application log files—files containing information on files, including who accessed them and when—so if an intruder makes it into the network or an unauthorized application, the system detects the intrusion, halts the session and sets off an alarm to notify the system administrator.
a) Intrusion-detection systems.
b) Digital-signature systems.
c) Air-gap systems.
d) None of the above
a) Intrusion-detection systems.
Computer Science & Information Technology
You might also like to view...
A ________ box alerts you to a potential problem and gives you the options of continuing or stopping the process
A) message B) dialog C) warning D) window
Computer Science & Information Technology
________ is the standard internal drive interface used to connect drives to the motherboard
Fill in the blank(s) with correct word
Computer Science & Information Technology
A dat macro is created while you are viewing a ________ in Datasheet view
A) table B) macro C) report D) query
Computer Science & Information Technology
The default corners where borders join are ________
A) angled B) mitered C) dashed D) rounded
Computer Science & Information Technology