Which of the following is a software-based application that runs on a local host computer that can detect an attack asit occurs?

A. local-based intrusion detection system
B. host-based intrusion detection system
C. host-based application protection
D. local-based application protection


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following parts of a BDE event should be used for code that should execute once when the event stops?

a. Begin b. During c. End d. Stop e. None of these

Computer Science & Information Technology

Analyze the following code.

``` public class Test { int x; public Test(String t) { System.out.println("Test"); } public static void main(String[] args) { Test test = null; System.out.println(test.x); } }``` a. The program has a compile error because test is not initialized. b. The program has a compile error because x has not been initialized. c. The program has a compile error because you cannot create an object from the class that defines the object. d. The program has a compile error because Test does not have a default constructor. e. The program has a runtime NullPointerException because test is null while executing test.x.

Computer Science & Information Technology

If content is frequently printed and then read from the printed material, many designers feel that a ____ font is preferable.

A. sans-serif B. serif C. monospace D. cursive

Computer Science & Information Technology

which of the following is false?

a. when you pass a variable by reference, the receiving procedure can change its contents. b. to pass a variable by reference in visual basic, you include the ByRef keyword before the variable's name in the call statement. c. when you pass a variable by value, the receiving procedure creates a procedure-level variable that it uses to store the value passed to it. d. when you pass a variable by value, the receiving procedure cannot change its contents.

Computer Science & Information Technology