IDS/IPS identify misuse and anomaly on the network. They detect a misuse intrusion by matching the network packets with their signatures for known attacks or activities that are classified as bad. This can aid with which of the following?
What will be an ideal response?
Data loss prevention
Computer Science & Information Technology
You might also like to view...
________ of Office Web Apps is free, and requires only a Windows Live ID and a computer with an Internet connection and supported browser software.
a. Business use b. Open license use c. Personal use d. Institutional use
Computer Science & Information Technology
What kind of relationship exists between a superclass and a subclass?
What will be an ideal response?
Computer Science & Information Technology