An IDS is used for which of the following purpose?

A. Controls inbound and outbound connections to prevent unauthorized access to the Internet.
B. Controls inbound and outbound connections in a network device by command lines.
C. Monitors inbound and outbound network connections in order to identify suspicious activity.
D. Monitors inbound and outbound network connections in order to prevent suspicious activity


Answer: C. Monitors inbound and outbound network connections in order to identify suspicious activity.

Computer Science & Information Technology

You might also like to view...

The ____________________ toolbar contains icons for resizing and cropping figures once they have been inserted into a presentation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

With IPv6-over-IPv4, when the IPv4 header is created, what value is the protocol field value set at to indicate that it is an encapsulated IPv6 packet?

A. 37 B. 41 C. 53 D. 61

Computer Science & Information Technology

To delete a column, ________ any cell in the column, click Delete, and then click Delete Column

A) highlight B) right-click C) select D) left-click

Computer Science & Information Technology

Bryson has contacted you because he needs to know what kind of data he can synchronize from his iPad to his PC.   What can Bryson synchronize from his iPad to his PC? (Select all that apply.)

A. Contacts B. E-books C. Photos D. Music E. Notes F. Location Data G. Calendar

Computer Science & Information Technology