A(n) ____________________ examines traffic and notes suspicious behavior in a log and may also notify a network manager through email, instant message, or some other communication.

Fill in the blank(s) with the appropriate word(s).


passive IDS

Computer Science & Information Technology

You might also like to view...

____ relies on the honor system, and you and your friends are expected to pay and register after the specific time.

A. Freeware B. Commercial software C. Shareware D. Open source software

Computer Science & Information Technology

The SmartArt button is found in the ________ group under the Insert tab

A) Tables B) Text C) Pages D) Illustrations

Computer Science & Information Technology

What should you do if someone is looking over your shoulder as you log on to your computer?

A) Type your password quickly. B) Ask them to leave the room. C) Type your password at your normal pace so that you don't make a mistake, but tap your thumb a couple of times as if you are typing a key. D) Wait until they are not looking to type your password.

Computer Science & Information Technology

The Google Forms results summary displays the responses to the survey as a ____.

A. document B. chart C. database D. spreadsheet

Computer Science & Information Technology