Which of the following IDS techniques seeks to prevent intrusions before they occur?
a. Infiltration
b. Preemptive blocking
c. Resource profiling
d. Threshold monitoring
ANS: B
You might also like to view...
You can add a(n) ____ layer by applying a style to a layer.
a. vector b. effects c. style d. pattern
The word shown in bold is used correctly in the following sentence.How will the cuts affect passenger service??
Answer the following statement true (T) or false (F)
The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.
Fill in the blank(s) with the appropriate word(s).
The term _________________________ is used to address the pair of forward and reverse certificates associated with a particular CA.
Fill in the blank(s) with the appropriate word(s).