Which of the following allows an administrator to view malicious activity after it has taken place?

A. IDS
B. IPS
C. Port scanner
D. Packet sniffer


Answer: A. IDS

Computer Science & Information Technology

You might also like to view...

The ____________________ Document Format has become a universal standard for exchanging documents, spreadsheets, and other types of data files.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

By default, the text you type into a Word document replaces existing text

Indicate whether the statement is true or false

Computer Science & Information Technology

When a function invokes itself, the process is called ____ recursion.

A. direct B. mutual C. self-referential D. indirect

Computer Science & Information Technology

Case 2You have recently been promoted from Assistant Production Manager to Design Supervisor at your company. Answer the following questions. Which of the following is not a principle of design that you will want to incorporate into your work?

A. Balance B. Integration C. Contrast D. Value

Computer Science & Information Technology