Which of the following software types would BEST be used for identifying an attack?
A. IDS
B. IPS
C. Packet sniffer
D. Port scanner
Answer: A. IDS
Computer Science & Information Technology
You might also like to view...
Apply a filter effect to text to create a special effect
Indicate whether the statement is true or false
Computer Science & Information Technology
When you open a new template as the starting point for a new document, which of the following is NOT true?
A) The new document appears as "Copy of" followed by the old document name. B) All of the content from the original document will be visible. C) You use the structure of the template as the starting point for the new document. D) The document is unnamed.
Computer Science & Information Technology