The _______ copies evidence of intrusions to an investigation workstation automatically for further analysis over the network.

A. ?intrusion detection system
B. ?active defense mechanism
C. ?total awareness system
D. ?intrusion monitoring system


Answer: A

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. UML requires that the programmer understand every detail and dark corner of C++ to be useful. 2. A pattern is a design principle that solves a problem that occurs over and over.

Computer Science & Information Technology

In the MySQL Query Browser, the ____ Browser allows you to save queries that you use frequently.

A. Bookmarks B. Information C. Save D. Params

Computer Science & Information Technology

In most object-oriented languages, a method named ____________________ executes automatically when a class object is created.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Given the following array declaration, what is the value stored in the scores[1][1] element? ? int scores[3][3] = { {1, 2, 3}, {4, 5, 6}, {7, 8, 9} };

A. 1 B. 4 C. 7 D. 5

Computer Science & Information Technology