Which of the following is NOT a described IDPS control strategy?

A. centralized
B. fully distributed
C. partially distributed
D. decentralized


Answer: C

Computer Science & Information Technology

You might also like to view...

What are some of the characteristics of weak passwords?

What will be an ideal response?

Computer Science & Information Technology

One advantage to benchmarking is that best practices change very little over time.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Location of Instances are ____________

A. Regional B. based on Availability Zone C. Global

Computer Science & Information Technology

The rm command with the ____ option asks for confirmation before deleting.

A. -c B. -f C. -i D. -r

Computer Science & Information Technology