Which of the following allows an administrator to view malicious activity after it has taken place?
A. IDS
B. IPS
C. Port scanner
D. Packet sniffer
Answer: A. IDS
You might also like to view...
The ____________________ Document Format has become a universal standard for exchanging documents, spreadsheets, and other types of data files.
Fill in the blank(s) with the appropriate word(s).
By default, the text you type into a Word document replaces existing text
Indicate whether the statement is true or false
When a function invokes itself, the process is called ____ recursion.
A. direct B. mutual C. self-referential D. indirect
Case 2You have recently been promoted from Assistant Production Manager to Design Supervisor at your company. Answer the following questions. Which of the following is not a principle of design that you will want to incorporate into your work?
A. Balance B. Integration C. Contrast D. Value