_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.

A. RFC 4767 B. RFC 4766

C. RFC 4765 D. RFC 4764

A. RFC 4767

Computer Science & Information Technology

You might also like to view...

You can create a scenario from the Solver dialog box, or you can open the Scenario Manager dialog box and create a scenario

Indicate whether the statement is true or false

Computer Science & Information Technology

The two basic parts of authentication are usernames and passwords

a. true b. false

Computer Science & Information Technology