Which of the following IDS techniques seeks to prevent intrusions before they occur?

a. Infiltration
b. Preemptive blocking
c. Resource profiling
d. Threshold monitoring


ANS: B

Computer Science & Information Technology

You might also like to view...

You can add a(n) ____ layer by applying a style to a layer.

a. vector b. effects c. style d. pattern

Computer Science & Information Technology

The word shown in bold is used correctly in the following sentence.How will the cuts affect passenger service??

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The term _________________________ is used to address the pair of forward and reverse certificates associated with a particular CA.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology