Intrusion __________ activities finalize the restoration of operations to a normal state and seek to identify the source and method of the intrusion in order to ensure that the same type of attack cannot occur again.
A. prevention
B. reaction
C. detection
D. correction
Answer: D
You might also like to view...
Answer the following statements true (T) or false (F)
1) Constructors are inherited. After all something has to initialize the inherited variables. 2) When class D is derived from class B, the derived class is usually smaller. Explain. 3) B is a base class of D, then D’s members cannot access the private data members of B without regard to the kind of inheritance. 4) If B is a base class of D, then D’s members cannot invoke private member functions of B without regard to the kind of inheritance. 5) If B is a public base class of D, then D’s members cannot invoke public members functions of B.
Adware and spyware are referred to collectively as ________
A) viruses B) alertware C) firmware D) grayware
What command launches the Remote Desktop client for Windows?
A. rdp B. rdesktop C. vnc D. mstsc
Which of the following commands would you enter to display only the static routes?
A) show static ip route B) show routes static C) show route static D) show ip route static