A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.
Fill in the blank(s) with the appropriate word(s).
passive IDS
You might also like to view...
____ relies on the honor system, and you and your friends are expected to pay and register after the specific time.
A. Freeware B. Commercial software C. Shareware D. Open source software
The SmartArt button is found in the ________ group under the Insert tab
A) Tables B) Text C) Pages D) Illustrations
What should you do if someone is looking over your shoulder as you log on to your computer?
A) Type your password quickly. B) Ask them to leave the room. C) Type your password at your normal pace so that you don't make a mistake, but tap your thumb a couple of times as if you are typing a key. D) Wait until they are not looking to type your password.
The Google Forms results summary displays the responses to the survey as a ____.
A. document B. chart C. database D. spreadsheet