Your organization's network was recently the target of an attack. Fortunately, the new system you installed took action and refused traffic from the source before you even had a chance to respond. What system did you install?

A. An authorization system
B. An intrusion detection system
C. A logging system
D. An intrusion prevention system
E. An authentication system

Answer: D. An intrusion prevention system

Computer Science & Information Technology

You might also like to view...

Today the most commonly used character code is the IRA, referred to in the United States as _____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In Java, the operator NOT is represented by ____.

A. && B. | | C. ! D. < >

Computer Science & Information Technology