_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.

A. RFC 4767 B. RFC 4766

C. RFC 4765 D. RFC 4764


A. RFC 4767

Computer Science & Information Technology

You might also like to view...

Computers work with two general categories of sound: digital audio and MP3 sound.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Moving between worksheets in a workbook is done by clicking on ________

A) the title bar B) the name box C) a worksheet tab D) the new option from the Quick Access Toolbar

Computer Science & Information Technology

What do discs, like the kind shown in the accompanying figure, usually measure?

A. 3.5 inches in diameter and less than one-twentieth of an inch thick B. 4.75 inches in diameter and less than one-twentieth of an inch thick C. 3.5 inches in diameter and more than one-twentieth of an inch thick D. 4.75 inches in diameter and more than one-twentieth of an inch thick

Computer Science & Information Technology

A(n) ____________________ filter is a software filter-technically not a firewall-that allows administrators to restrict access to content from within a network.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology