________ monitor networks and application log files—files containing information on files, including who accessed them and when—so if an intruder makes it into the network or an unauthorized application, the system detects the intrusion, halts the session and sets off an alarm to notify the system administrator.
a) Intrusion-detection systems.
b) Digital-signature systems.
c) Air-gap systems.
d) None of the above
a) Intrusion-detection systems.
Computer Science & Information Technology
You might also like to view...
Since a Uniform Resource Locator (URL) has no common break points such as blank spaces, applying the _________ option ensures that the text string of the URL will be kept to a manageable length by breaking it as needed to fit within the page layout.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
_________ is a characteristic that refers to the ability of a system to fail in such a way as to preserve as much capability and data as possible.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology