Network and host __________ monitor and analyze network and host activity and usually compare this information with a collection of attack signatures to identify potential security incidents.
Fill in the blank(s) with the appropriate word(s).
intrusion detection systems (IDS)
Computer Science & Information Technology
You might also like to view...
You can reduce the size of electronic documents when transferring them over the Internet by using a process called _____.
A. zipping B. shrinking C. contracting D. diminishing
Computer Science & Information Technology
Click the File tab and Exit in order to close an application
Indicate whether the statement is true or false
Computer Science & Information Technology
Which of the following log security levels would indicate the most immediate action would be needed, such as in an emergency?
A) 0 B) 1 C) 6 D) 7
Computer Science & Information Technology
An expression using the logical operator ____ will evaluate to true only when both of the conditions are true.
A. And B. Or C. Not D. Nor
Computer Science & Information Technology