_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.
A. RFC 4767 B. RFC 4766
C. RFC 4765 D. RFC 4764
A. RFC 4767
Computer Science & Information Technology
You might also like to view...
You can create a scenario from the Solver dialog box, or you can open the Scenario Manager dialog box and create a scenario
Indicate whether the statement is true or false
Computer Science & Information Technology
The two basic parts of authentication are usernames and passwords
a. true b. false
Computer Science & Information Technology