Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.

A. prevention
B. reaction
C. detection
D. correction


Answer: D

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) Constructors are inherited. After all something has to initialize the inherited variables. 2) When class D is derived from class B, the derived class is usually smaller. Explain. 3) B is a base class of D, then D’s members cannot access the private data members of B without regard to the kind of inheritance. 4) If B is a base class of D, then D’s members cannot invoke private member functions of B without regard to the kind of inheritance. 5) If B is a public base class of D, then D’s members cannot invoke public members functions of B.

Computer Science & Information Technology

Adware and spyware are referred to collectively as ________

A) viruses B) alertware C) firmware D) grayware

Computer Science & Information Technology

What command launches the Remote Desktop client for Windows?

A. rdp B. rdesktop C. vnc D. mstsc

Computer Science & Information Technology

Which of the following commands would you enter to display only the static routes?

A) show static ip route B) show routes static C) show route static D) show ip route static

Computer Science & Information Technology