Your organization's network was recently the target of an attack. Fortunately, the new system you installed took action and refused traffic from the source before you even had a chance to respond. What system did you install?
A. An authorization system
B. An intrusion detection system
C. A logging system
D. An intrusion prevention system
E. An authentication system
Answer: D. An intrusion prevention system
Computer Science & Information Technology
You might also like to view...
Today the most commonly used character code is the IRA, referred to in the United States as _____________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
In Java, the operator NOT is represented by ____.
A. && B. | | C. ! D. < >
Computer Science & Information Technology