__________ applications use a combination of techniques to detect an intrusion and then trace it back to its source.
A. Honeynet
B. Trap-and-trace
C. HIDPS
D. Packet sniffer
Answer: B
You might also like to view...
Match the following parts of the Computer window to their function:
I title bar II. address bar III. Back button IV. navigation pane V. command bar A. part of a folder window that displays the folder structure in a vertical list B. allows one to navigate to a folder that has already been opened C. displays your current location in the folder structure D. contains the minimize, maximize/restore down, and close buttons E. provides buttons to perform common tasks
____________________ consists of plastic tape coated with a magnetizable substance that represents the bits and bytes of digital data, similar to magnetic hard disks.
Fill in the blank(s) with the appropriate word(s).