Which of the following security appliances are used to only identify traffic on individual systems?
A. Host based IPS
B. Application based IPS
C. Network based IDS
D. Host based IDS
Answer: D. Host based IDS
Computer Science & Information Technology
You might also like to view...
If a bubble sort is used to arrange the numbers 7 5 3 9 2 6 in ascending order, what order will the data be in after the first pass?
A) 2 5 3 9 7 6 B) 5 7 3 9 2 6 C) 5 3 7 2 6 9 D) 2 3 5 6 7 9 E) none of the above
Computer Science & Information Technology
List four criteria for evaluating system hardware.
What will be an ideal response?
Computer Science & Information Technology