The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.
A. ?intrusion detection system
B. ?active defense mechanism
C. ?total awareness system
D. ?intrusion monitoring system
Answer: A
You might also like to view...
Answer the following questions true (T) or false (F)
1. UML requires that the programmer understand every detail and dark corner of C++ to be useful. 2. A pattern is a design principle that solves a problem that occurs over and over.
In the MySQL Query Browser, the ____ Browser allows you to save queries that you use frequently.
A. Bookmarks B. Information C. Save D. Params
In most object-oriented languages, a method named ____________________ executes automatically when a class object is created.
Fill in the blank(s) with the appropriate word(s).
Given the following array declaration, what is the value stored in the scores[1][1] element? ? int scores[3][3] = { {1, 2, 3}, {4, 5, 6}, {7, 8, 9} };
A. 1 B. 4 C. 7 D. 5