Which of the following best describes an intrusion prevention system?

A. Passive devices that analyze network traffic to detect unauthorized access
B. Active devices that sit inline with traffic and can respond to intrusions by disabling the connection, dropping the packet, or deleting the malicious content
C. A software or hardware device that can filter incoming or outgoing traffic based on specific rules
D. A device that monitors the characteristics of a single host and the events occurring on that host

Answer: B
Explanation: An Intrusion prevention system (IPS) is an active device that monitors traffic and can respond to intrusions.

Computer Science & Information Technology

You might also like to view...

When all tables in a database meet the criteria for the first three normal forms, it is said to be in ________

A) 0NF B) 1NF C) 2NF D) 3NF

Computer Science & Information Technology

Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology