A network IPS is used for which of the following?
A. To identify and document network based intrusions and network traffic
B. To document and analyze network visualization threats and performance
C. To identify and prevent network based intrusions or unwanted network traffic
D. To document and analyze malware and viruses on the Internet
Answer: C. To identify and prevent network based intrusions or unwanted network traffic
You might also like to view...
What is a chart sheet and what are its limitations?
What will be an ideal response?
Sarah needs to connect to an interface port on an enterprise switch. Her laptop does not have the correct port. When she mentions this to her boss, he tells her that they have several older laptops in a closet and one of them should have a RS-232 connector for the enterprise switch. ? What does the connector that Sarah needs look like?
A. A 15 pin three row D-shaped connector B. A rectangle with a blue connection in the middle C. A 6 pin round connector that is purple D. A 9 pin two row D-shaped male connector
____ is any technology that aids in gathering information about a person or organization without their knowledge.
A. A bot B. Spyware C. A Trojan D. A worm
Which power supply connector is the main motherboard power connector on most motherboards today?
A. 20-pin B. 8-pin C. 24-pin D. 15-pin